20150316
2687
Comment:
|
← Revision 29 as of 2015-03-16 16:59:48 ⇥
2951
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
== Meeting (DRAFT) == | ## page was copied from MeetingLogs/Security/20150309 == Meeting == |
Line 3: | Line 5: |
* '''When''': [[http://www.timeanddate.com/worldclock/fixedtime.html?month=01&day=12&year=2015&hour=16&min=30&sec=0&p1=0|Mon Jan 12th 2014 16:30 UTC]] * '''End''': 17:00 UTC |
* '''When''': Mon Mar 16th 2015 16:32 UTC * '''End''': 16:58 UTC |
Line 6: | Line 8: |
* '''Chaired By''': JamieStrandboge (jdstrand) | * '''Chaired By''': Tyler Hicks (tyhicks) |
Line 18: | Line 20: |
* None | |
Line 22: | Line 23: |
* Lev Lazinskiy (levlaz) provided a debdiff for precise for nginx (LP: #1370478). Your work is very much appreciated and will keep Ubuntu users secure. Great job! :) | * Stefan Bader (smb) provided debdiffs for xen for precise to utopic * Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750) |
Line 25: | Line 27: |
* weekly role: triage * snappy * pending issues |
* Close out the discussions around snappy signatures and hashes * Snappy hardware access and snappy frameworks * Review tools and click-apparmor changes for the snappy work mentioned above * Embargoed issue |
Line 29: | Line 32: |
* weekly role: cve triage * Published several USNs prior to the meeting * Plan on working on updates for php5, libav, and an embargoed issue * sbeattie * weekly role: happy place * Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa * gcc-5 pie testing * AppArmor patch review * triage issue around dhclient not being confined when booting with systemd * tyhicks |
|
Line 30: | Line 43: |
* pending updates (openssl) * embargoed issue * sbeattie * pending updates (various yaml packages) * !AppArmor patch review * binutils security update * pick up pie-on-amd64 * tyhicks * pending updates (git) * help with Bug:1408106 - attach_disconnected not sufficient for overlayfs * get back to Bug:1362469 - AppArmor unrequested reply protection generates unallowable denials |
* Testing and fixing any bugs found in the libapparmor aa_features string parsing routines * Restart work on AppArmor kernel keyring mediation for user data encryption * Finish up the patches to fix bug #1430532 and send them out for review |
Line 42: | Line 47: |
* monthly !AppArmor meeting * !AppArmor patch review * Bug:1408833 * Bug:1408106 - attach_disconnected not sufficient for overlayfs * !AppArmor upstreaming |
* Finish up patches for bug #1431717 and bug #1430546 * libapparmor cache API review * Send out patches around DFA testing * AppArmor kernel cleanups and upstreaming * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing |
Line 48: | Line 53: |
* weekly role: happy place * pending updates (coreutils) * MIR audits * chrisccoulson * mozilla updates * Bug:1377198 - CertificateError is not cancelled if you stop the pending navigation |
* weekly role: bug triage * Outstanding MIR requests * OpenStack security updates * chriscoulson * Finish removing oxide's dependency on GL share groups * Embargoed issue |
Line 58: | Line 63: |
* tyhicks asked the !AppArmor devs if there was anything else needed to help the patch review for his patches. They responded "more time" | |
Line 61: | Line 65: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-01-12-17.12.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 16th 2015 16:32 UTC
End: 16:58 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
Agenda
- Announcements
- Stefan Bader (smb) provided debdiffs for xen for precise to utopic
- Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- Close out the discussions around snappy signatures and hashes
- Snappy hardware access and snappy frameworks
- Review tools and click-apparmor changes for the snappy work mentioned above
- Embargoed issue
- mdeslaur
- weekly role: cve triage
- Published several USNs prior to the meeting
- Plan on working on updates for php5, libav, and an embargoed issue
- sbeattie
- weekly role: happy place
- Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa
- gcc-5 pie testing
AppArmor patch review
- triage issue around dhclient not being confined when booting with systemd
- tyhicks
- weekly role: community
- Testing and fixing any bugs found in the libapparmor aa_features string parsing routines
Restart work on AppArmor kernel keyring mediation for user data encryption
- Finish up the patches to fix bug #1430532 and send them out for review
- jjohansen
- Finish up patches for bug #1431717 and bug #1430546
- libapparmor cache API review
- Send out patches around DFA testing
AppArmor kernel cleanups and upstreaming
- Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing
- sarnold
- weekly role: bug triage
- Outstanding MIR requests
OpenStack security updates
- chriscoulson
- Finish removing oxide's dependency on GL share groups
- Embargoed issue
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt
MeetingLogs/Security/20150316 (last edited 2015-03-16 16:59:48 by tyhicks)