20150316
3051
Comment:
|
← Revision 29 as of 2015-03-16 16:59:48 ⇥
2951
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20150209 | ## page was copied from MeetingLogs/Security/20150309 |
Line 4: | Line 5: |
* '''When''': [[http://www.timeanddate.com/worldclock/fixedtime.html?month=02&day=09&year=2015&hour=16&min=30&sec=0&p1=0|Mon Feb 9th 2015 16:30 UTC]] * '''End''': 16:54 UTC |
* '''When''': Mon Mar 16th 2015 16:32 UTC * '''End''': 16:58 UTC |
Line 22: | Line 23: |
* We have created a new role in our rotation schedule. "Triage" has been split into "CVE Triage" and "Bug Triage". * Gianfranco Costamagna (LocutusOfBorg) provided debdiffs for precise-utopic for virtualbox (LP: #1413603) * Otto Kekaelaeinen (otto) provided debdiffs for trusty and utopic for mariadb-5.5 (LP: #1414755) * Thomas Ward (teward) provided a debdiff for utopic for wireshark (LP: #1418211) * Joe Damato (ice799) provided a debdiff for precise for libfcgi (LP: #1418778) * Those four contributions are very much appreciated and will keep Ubuntu users secure. Great job! :) |
* Stefan Bader (smb) provided debdiffs for xen for precise to utopic * Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750) |
Line 30: | Line 27: |
* Help define snappy hardware access * Working on snappy fingerprinting |
* Close out the discussions around snappy signatures and hashes * Snappy hardware access and snappy frameworks * Review tools and click-apparmor changes for the snappy work mentioned above |
Line 34: | Line 32: |
* weekly role: cve triage * Published several USNs prior to the meeting * Plan on working on updates for php5, libav, and an embargoed issue * sbeattie |
|
Line 35: | Line 37: |
* Security updates * ntp should go out today * krb5 testing * sbeattie |
* Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa * gcc-5 pie testing * AppArmor patch review * triage issue around dhclient not being confined when booting with systemd * tyhicks |
Line 40: | Line 43: |
* binutils update * gcc pie work items * tyhicks * weekly role: bug triage * Test and propose v4 of the dbus-daemon AppArmor mediation patch set * Propose v2 of the libapparmor aa_features API * Patch update |
* Testing and fixing any bugs found in the libapparmor aa_features string parsing routines * Restart work on AppArmor kernel keyring mediation for user data encryption * Finish up the patches to fix bug #1430532 and send them out for review |
Line 48: | Line 47: |
* Discuss kernel interface context (mode values), LSM stacking patch set, and libapparmor API proposal * Revise fix for deleted socket mediation (LP: #1408833) * Working towards upstreaming our AppArmor kernel delta |
* Finish up patches for bug #1431717 and bug #1430546 * libapparmor cache API review * Send out patches around DFA testing * AppArmor kernel cleanups and upstreaming * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing |
Line 52: | Line 53: |
* weekly role: cve triage * Horizon update * OpenStack update testing |
* weekly role: bug triage * Outstanding MIR requests * OpenStack security updates |
Line 56: | Line 57: |
* Release oxide 1.4.3 * Continuing work on the 1.6 branch: https://launchpad.net/oxide/+milestone/branch-1.6 |
* Finish removing oxide's dependency on GL share groups * Embargoed issue |
Line 65: | Line 65: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-02-09-16.30.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 16th 2015 16:32 UTC
End: 16:58 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
Agenda
- Announcements
- Stefan Bader (smb) provided debdiffs for xen for precise to utopic
- Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- Close out the discussions around snappy signatures and hashes
- Snappy hardware access and snappy frameworks
- Review tools and click-apparmor changes for the snappy work mentioned above
- Embargoed issue
- mdeslaur
- weekly role: cve triage
- Published several USNs prior to the meeting
- Plan on working on updates for php5, libav, and an embargoed issue
- sbeattie
- weekly role: happy place
- Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa
- gcc-5 pie testing
AppArmor patch review
- triage issue around dhclient not being confined when booting with systemd
- tyhicks
- weekly role: community
- Testing and fixing any bugs found in the libapparmor aa_features string parsing routines
Restart work on AppArmor kernel keyring mediation for user data encryption
- Finish up the patches to fix bug #1430532 and send them out for review
- jjohansen
- Finish up patches for bug #1431717 and bug #1430546
- libapparmor cache API review
- Send out patches around DFA testing
AppArmor kernel cleanups and upstreaming
- Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing
- sarnold
- weekly role: bug triage
- Outstanding MIR requests
OpenStack security updates
- chriscoulson
- Finish removing oxide's dependency on GL share groups
- Embargoed issue
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt
MeetingLogs/Security/20150316 (last edited 2015-03-16 16:59:48 by tyhicks)