20150316

Differences between revisions 26 and 29 (spanning 3 versions)
Revision 26 as of 2015-03-09 17:10:36
Size: 2446
Editor: tyhicks
Comment:
Revision 29 as of 2015-03-16 16:59:48
Size: 2951
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20150302 ## page was copied from MeetingLogs/Security/20150309
Line 5: Line 5:
 * '''When''': Mon Mar 9th 2015 16:35 UTC
 * '''End''': 17:08 UTC
 * '''When''': Mon Mar 16th 2015 16:32 UTC
 * '''End''': 16:58 UTC
Line 23: Line 23:
  * Stefan Bader (smb) provided debdiffs for xen for precise to utopic
  * Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750)
Line 25: Line 27:
   * finishing the store review tools tests for snappy and then uploading
   * frameworks and longer term design of snappy hardware access
   * Close out the discussions around snappy signatures and hashes
   * Snappy hardware access and snappy frameworks
   * Review tools and click-apparmor changes for the snappy work mentioned above
   * Embargoed issue
Line 28: Line 32:
   * weekly role: cve triage
   * Published several USNs prior to the meeting
   * Plan on working on updates for php5, libav, and an embargoed issue
  * sbeattie
Line 29: Line 37:
   * Working on fixing the ABI break that caused the icu update regression (precise only)
   * php5 and apache updates
  * sbeattie
   * Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa
   * gcc-5 pie testing
   * AppArmor patch review
   * triage issue around dhclient not being confined when booting with systemd
  * tyhicks
Line 33: Line 43:
   * triage issue around dhclient not being confined when booting with systemd
   * gcc pie testing
  * tyhicks
   * weekly role: bug triage
   * publish ecryptfs-utils security updates
   * restart work on AppArmor kernel keyring mediation for user data encryption
   * discuss overlayfs and AppArmor with jjohansen
   * Testing and fixing any bugs found in the libapparmor aa_features string parsing routines
   * Restart work on AppArmor kernel keyring mediation for user data encryption
   * Finish up the patches to fix bug #1430532 and send them out for review
Line 41: Line 47:
   * AppArmor patch reviews
   * followup with kernel team regarding the bug #1423810 and #1423810 fixes landing
   * Finish up patches for bug #1431717 and bug #1430546
   * libapparmor cache API review
   * Send out patches around DFA testing
Line 44: Line 51:
   * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing
Line 45: Line 53:
    * weekly role: cve triage
    * several MIRs at the server team's request
    * weekly role: bug triage
    * Outstanding MIR requests
Line 49: Line 57:
    * Working on phone bugs
    * Release oxide 1.5.5
    * Oxide merge request review
    * Finish removing oxide's dependency on GL share groups
    * Embargoed issue
Line 58: Line 65:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-09-16.35.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Mar 16th 2015 16:32 UTC

  • End: 16:58 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • chrisccoulson

Not present

Agenda

  • Announcements
    • Stefan Bader (smb) provided debdiffs for xen for precise to utopic
    • Christian Hertel provided a debdiff for tntnet for precise (LP: #1430750)
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • Close out the discussions around snappy signatures and hashes
      • Snappy hardware access and snappy frameworks
      • Review tools and click-apparmor changes for the snappy work mentioned above
      • Embargoed issue
    • mdeslaur
      • weekly role: cve triage
      • Published several USNs prior to the meeting
      • Plan on working on updates for php5, libav, and an embargoed issue
    • sbeattie
      • weekly role: happy place
      • Refreshing gcc-5 pie package against newer versions in the toolchain-r ppa
      • gcc-5 pie testing
      • AppArmor patch review

      • triage issue around dhclient not being confined when booting with systemd
    • tyhicks
      • weekly role: community
      • Testing and fixing any bugs found in the libapparmor aa_features string parsing routines
      • Restart work on AppArmor kernel keyring mediation for user data encryption

      • Finish up the patches to fix bug #1430532 and send them out for review
    • jjohansen
      • Finish up patches for bug #1431717 and bug #1430546
      • libapparmor cache API review
      • Send out patches around DFA testing
      • AppArmor kernel cleanups and upstreaming

      • Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing
    • sarnold
      • weekly role: bug triage
      • Outstanding MIR requests
      • OpenStack security updates

    • chriscoulson
      • Finish removing oxide's dependency on GL share groups
      • Embargoed issue
  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-16-16.32.moin.txt

MeetingLogs/Security/20150316 (last edited 2015-03-16 16:59:48 by tyhicks)