20180423
|
Size: 3132
Comment:
|
← Revision 95 as of 2018-04-23 17:26:40 ⇥
Size: 2488
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20171106 ## page was copied from MeetingLogs/Security/20171030 |
## page was copied from MeetingLogs/Security/20180416 |
| Line 5: | Line 4: |
| * '''When''': Mon Nov 6th 2017 16:37 UTC * '''End''': 17:00 UTC |
* '''When''': Mon Apr 23 16:32:34 2018 UTC * '''End''': 16:53:09 |
| Line 8: | Line 7: |
| * '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Emily Ratliff (ratliff) |
| Line 11: | Line 10: |
| {{{#!wiki comment * None }}} |
|
| Line 14: | Line 16: |
| * tyhicks | * jjohansen |
| Line 17: | Line 19: |
| * leosilva | |
| Line 18: | Line 21: |
| * leosilva | |
| Line 20: | Line 22: |
| {{{#!wiki comment | |
| Line 21: | Line 24: |
| * jjohansen | * jdstrand }}} |
| Line 25: | Line 29: |
| * Lucas Kocia (lkocia) provided a debdiff for xenial for firewalld (LP: #Bug:1617617) * Jeremy Bicha (jbicha) provided a debdiff for zesty for gdm3 (LP: #Bug:1729354) |
* Generalist role rotation * CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva {{{#!wiki comment * Contributions * James Cowgill (jcowgill) provided a debdiff for xenial for ffmpeg (LP: #Bug:1697785) * Simon Quigley (tsimonq2) provided debdiffs for trusty-artful for calibre (LP: #Bug:1758699) }}} |
| Line 29: | Line 38: |
| * finish new spread tests for better high-level coverage of security backends * snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * investigate udev_enumerate regression * broadcom-asic-control interface bug * continue uid/gid work for snap privilege dropping |
* focus on snap usns * critical priority snapd PR reviews, if needed * sprint prep * time permitting: investigate resquashfs with respect to electron-builder |
| Line 36: | Line 43: |
| * weekly role: bug triage * openssl updates * imagemagick updates * additional security updates |
* mysql update publication * embargoed issue * security updates |
| Line 41: | Line 47: |
| * weekly role: cve triage * openjdk-8 updates to test and publish |
|
| Line 44: | Line 48: |
| * CVE notifications for snap owners * wrap up the !AppArmor migration to gitlab * tyhicks * weekly role: happy place * eCryptfs patch review * squashfs reproduceability * get final clarification on AppArmor audit even ID numbers * embargoed issues {{{#!wiki comment |
* gcc retpoline backports for 12.04 ESM * check over the release notes and security features wiki pages for 18.04 * investigate the apparmor parser userspace tests failures in some environments * misc review work |
| Line 54: | Line 53: |
| * 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog }}} |
* investigate several new 2.13 bugs, including an issue in expr-simplify * review mount changes from David Howells * follow-up on on bugs LP #Bug:1750594 and #Bug:1679704 * revisions for policy hashing and policy versioning patching * LSM stacking review for Casey * work on prompting prototype |
| Line 60: | Line 60: |
| * weekly role: happy place * !AppArmor patch review * embargoed issue |
* MIRs * xe-guest-utilities |
| Line 64: | Line 63: |
| * prepare firefox update * large update that could use additional testing * update to rust 1.21 in all releases * two builds that randomly fail * !AppArmor kernel auditing changes |
* rust 1.25 updates - fix armhf and arm64 test failures * chromium-browser updates * thunderbolt updates |
| Line 70: | Line 67: |
| * weekly role: happy place * writing assignments * integrating InfluxDB into security KPIs |
* embargoed and internal work * sprint prep |
| Line 74: | Line 70: |
| * weekly role: community * liblouis updates * vim updates |
* ghostscript update * ruby triage |
| Line 79: | Line 74: |
| The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are: | |
| Line 85: | Line 79: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-11-06-16.37.moin.txt | http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 23 16:32:34 2018 UTC
End: 16:53:09
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Emily Ratliff (ratliff)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
- leosilva
- ratliff
Agenda
- Announcements
- Generalist role rotation
- CVE Triage: sarnold, Bug Triage: ratliff, Community: sbeattie, Happy Place: mdeslaur, leosilva
- Generalist role rotation
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- focus on snap usns
- critical priority snapd PR reviews, if needed
- sprint prep
- time permitting: investigate resquashfs with respect to electron-builder
- mdeslaur
- mysql update publication
- embargoed issue
- security updates
- sbeattie
- kernel CVE triage
- gcc retpoline backports for 12.04 ESM
- check over the release notes and security features wiki pages for 18.04
- investigate the apparmor parser userspace tests failures in some environments
- misc review work
- jjohansen
- sarnold
- MIRs
- xe-guest-utilities
- MIRs
ChrisCoulson
- rust 1.25 updates - fix armhf and arm64 test failures
- chromium-browser updates
- thunderbolt updates
- ratliff
- embargoed and internal work
- sprint prep
- leosilva
- ghostscript update
- ruby triage
- security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
http://ubottu.com/meetingology/logs/ubuntu-meeting/2018/ubuntu-meeting.2018-04-23-16.32.moin.txt
MeetingLogs/Security/20180423 (last edited 2018-04-23 17:26:40 by emilyr)