20180423
|
Size: 2915
Comment:
|
← Revision 95 as of 2018-04-23 17:26:40 ⇥
Size: 2488
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20171023 | ## page was copied from MeetingLogs/Security/20180416 |
| Line 4: | Line 4: |
| * '''When''': Mon Oct 30th 2017 16:33 UTC * '''End''': 16:45 UTC |
* '''When''': Mon Apr 23 16:32:34 2018 UTC * '''End''': 16:53:09 |
| Line 7: | Line 7: |
| * '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
| Line 10: | Line 10: |
| {{{#!wiki comment * None }}} |
|
| Line 13: | Line 16: |
| * tyhicks * chrisccoulson * ratliff * leosilva == Not present == |
|
| Line 21: | Line 18: |
| * chrisccoulson * leosilva * ratliff {{{#!wiki comment == Not present == * jdstrand }}} |
|
| Line 24: | Line 29: |
| * None | * Generalist role rotation * CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva {{{#!wiki comment * Contributions * James Cowgill (jcowgill) provided a debdiff for xenial for ffmpeg (LP: #Bug:1697785) * Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for calibre (LP: #Bug:1758699) }}} |
| Line 27: | Line 38: |
| * finish some snappy-debug work based on sprint feedback * snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * track udev tagging and device cgroup regression * verify uhid interface is still working * broadcom-asic-control interface bug * misc snapd interface policy updates for 2.29 * continue uid/gid work for snap privilege dropping |
* focus on snap usns * critical priority snapd PR reviews, if needed * sprint prep * time permitting: investigate resquashfs with respect to electron-builder |
| Line 36: | Line 43: |
| * weekly role: cve triage * quagga updates * additional security updates |
* mysql update publication * embargoed issue * security updates |
| Line 40: | Line 47: |
| * weekly role: happy place * followups from !AppArmor-in-Debian sprint * kernel signoffs and USN publications * openjdk-8 updates to test and publish * CVE notifications for snap owners * tyhicks * weekly role: happy place * eCryptfs patch review * squashfs reproduceability * embargoed issues {{{#!wiki comment |
* kernel CVE triage * gcc retpoline backports for 12.04 ESM * check over the release notes and security features wiki pages for 18.04 * investigate the apparmor parser userspace tests failures in some environments * misc review work |
| Line 52: | Line 53: |
| * 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog }}} |
* investigate several new 2.13 bugs, including an issue in expr-simplify * review mount changes from David Howells * follow-up on on bugs LP #Bug:1750594 and #Bug:1679704 * revisions for policy hashing and policy versioning patching * LSM stacking review for Casey * work on prompting prototype |
| Line 58: | Line 60: |
| * weekly role: happy place * spice-vdagent MIR * pcp MIR * !AppArmor patch review * embargoed issue |
* MIRs * xe-guest-utilities |
| Line 64: | Line 63: |
| * chromium-browser update to test and publish * look into unscheduled firefox release from last week * update to rust 1.21 in all releases * !AppArmor kernel auditing changes |
* rust 1.25 updates - fix armhf and arm64 test failures * chromium-browser updates * thunderbolt updates |
| Line 69: | Line 67: |
| * weekly role: community * writing assignments * integrating InfluxDB into security KPIs |
* embargoed and internal work * sprint prep |
| Line 73: | Line 70: |
| * weekly role: bug triage | * ghostscript update * ruby triage |
| Line 76: | Line 74: |
| The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
| Line 82: | Line 79: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-30-16.33.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 23 16:32:34 2018 UTC
End: 16:53:09
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
- leosilva
- ratliff
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- focus on snap usns
- critical priority snapd PR reviews, if needed
- sprint prep
- time permitting: investigate resquashfs with respect to electron-builder
- mdeslaur
- mysql update publication
- embargoed issue
- security updates
- sbeattie
- kernel CVE triage
- gcc retpoline backports for 12.04 ESM
- check over the release notes and security features wiki pages for 18.04
- investigate the apparmor parser userspace tests failures in some environments
- misc review work
- jjohansen
- sarnold
- MIRs
- xe-guest-utilities
- MIRs
ChrisCoulson
- rust 1.25 updates - fix armhf and arm64 test failures
- chromium-browser updates
- thunderbolt updates
- ratliff
- embargoed and internal work
- sprint prep
- leosilva
- ghostscript update
- ruby triage
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt
MeetingLogs/Security/20180423 (last edited 2018-04-23 17:26:40 by emilyr)