20150309
Size: 2956
Comment:
|
← Revision 26 as of 2015-03-09 17:10:36 ⇥
Size: 2446
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
== Meeting (DRAFT) == | == Meeting == |
Line 5: | Line 5: |
* '''When''': Mon Mar 9th 2015 16:30 UTC * '''End''': 17:00 UTC |
* '''When''': Mon Mar 9th 2015 16:35 UTC * '''End''': 17:08 UTC |
Line 25: | Line 25: |
* * updating the store review tools for snappy * helping with the oxide FFe and to coordinate some oxide work * team performance reviews * longer term design of snappy hardware access * discuss overlayfs and AppArmor in regards to snappy |
* finishing the store review tools tests for snappy and then uploading * frameworks and longer term design of snappy hardware access |
Line 33: | Line 29: |
* * patch piloting * ice updates * more security updates |
* Working on fixing the ABI break that caused the icu update regression (precise only) * php5 and apache updates |
Line 39: | Line 33: |
* * fix the fix for bug 1422521 * testing gcc-5 packages that have pie by default set * AppArmor patch review * possible AppArmor 2.9.2 release * do a more investigation into how the apparmor init script is working with systemd |
* triage issue around dhclient not being confined when booting with systemd * gcc pie testing |
Line 47: | Line 37: |
* * land fixes upstream, retest and publish ecryptfs-utils security updates * add the ability to check subfeatures and then send out v2 of the libapparmor API changes |
* publish ecryptfs-utils security updates |
Line 51: | Line 39: |
* discuss overlayfs and AppArmor with jjohansen | |
Line 52: | Line 41: |
* finish testing the fix for the failing fd inheritance tests on krillin (LP: #1423810) * triage bug 1425398 * push the current stack of bug fixes up to the kernel team * finish reviewing of the latest revision of the LSM stacking patches * review/discuss the libapparmor policy load api * sync up with jdstrand on overlayfs |
* AppArmor patch reviews * followup with kernel team regarding the bug #1423810 and #1423810 fixes landing |
Line 62: | Line 47: |
* OpenStack security updates | |
Line 63: | Line 49: |
* Thunderbird updates * possible Chromium and oxide updates * oxide bugs |
* Working on phone bugs * Release oxide 1.5.5 * Oxide merge request review |
Line 72: | Line 58: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-02-16.37.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-09-16.35.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 9th 2015 16:35 UTC
End: 17:08 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
Agenda
- Announcements
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finishing the store review tools tests for snappy and then uploading
- frameworks and longer term design of snappy hardware access
- mdeslaur
- weekly role: happy place
- Working on fixing the ABI break that caused the icu update regression (precise only)
- php5 and apache updates
- sbeattie
- weekly role: community
- triage issue around dhclient not being confined when booting with systemd
- gcc pie testing
- tyhicks
- jjohansen
- sarnold
- weekly role: cve triage
- several MIRs at the server team's request
OpenStack security updates
- chriscoulson
- Working on phone bugs
- Release oxide 1.5.5
- Oxide merge request review
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-09-16.35.moin.txt
MeetingLogs/Security/20150309 (last edited 2015-03-09 17:10:36 by tyhicks)