20150420
Size: 2687
Comment:
|
Size: 2927
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
== Meeting (DRAFT) == | ## page was copied from MeetingLogs/Security/20150223 ## page was copied from MeetingLogs/Security/20150209 == Meeting == |
Line 3: | Line 5: |
* '''When''': [[http://www.timeanddate.com/worldclock/fixedtime.html?month=01&day=12&year=2015&hour=16&min=30&sec=0&p1=0|Mon Jan 12th 2014 16:30 UTC]] * '''End''': 17:00 UTC |
* '''When''': Mon Feb 23rd 2015 16:36 UTC * '''End''': 17:04 UTC |
Line 6: | Line 8: |
* '''Chaired By''': JamieStrandboge (jdstrand) | * '''Chaired By''': Tyler Hicks (tyhicks) |
Line 18: | Line 20: |
* None | |
Line 22: | Line 23: |
* Lev Lazinskiy (levlaz) provided a debdiff for precise for nginx (LP: #1370478). Your work is very much appreciated and will keep Ubuntu users secure. Great job! :) | * Chris Pollock provided a debdiff for lucid for ClamAV (LP: #1420819). Your work is very much appreciated and will keep Ubuntu users secure. Great job! :) |
Line 25: | Line 26: |
* weekly role: triage * snappy * pending issues |
* snappy hardware access * update the SnappyConfinement spec * discuss overlayfs and AppArmor in regards to snappy * review tool changes |
Line 29: | Line 31: |
* weekly role: community * pending updates (openssl) * embargoed issue |
* weekly role: bug triage * publish Samba updates * publish e2fsprogs updates * publish ca-certificates updates * start on freetype updates |
Line 33: | Line 37: |
* pending updates (various yaml packages) * !AppArmor patch review * binutils security update * pick up pie-on-amd64 |
* weekly role: cve triage * request sponsorship of apparmor and apparmor-easyprof-ubuntu updates in Vivid * testing gcc-5 packages that have pie by default set |
Line 38: | Line 41: |
* pending updates (git) * help with Bug:1408106 - attach_disconnected not sufficient for overlayfs * get back to Bug:1362469 - AppArmor unrequested reply protection generates unallowable denials |
* weekly role: happy place * retest and publish ecryptfs-utils security updates * review and test an eCryptfs kernel fix * triage an eCryptfs data loss bug on btrfs * propose v2 of the libapparmor API changes * review some overlayfs related changes that went into 4.0-rc1 that may affect AppArmor |
Line 42: | Line 48: |
* monthly !AppArmor meeting * !AppArmor patch review * Bug:1408833 * Bug:1408106 - attach_disconnected not sufficient for overlayfs * !AppArmor upstreaming |
* triage failing fd inheritance tests on krillin (LP: #1423810) * get verification of the LP: #1408833 fix and push it to the kernel team * v2 libapparmor API review * AppArmor kernel cleanups and upstreaming |
Line 48: | Line 53: |
* weekly role: happy place * pending updates (coreutils) * MIR audits * chrisccoulson * mozilla updates * Bug:1377198 - CertificateError is not cancelled if you stop the pending navigation |
* weekly role: community * several MIRs at the server team's request * test and publish Horizon security update * discussions about the ppc64-diag MIR * chriscoulson * Firefox and Thunderbird updates * Embargoed stuff |
Line 58: | Line 65: |
* tyhicks asked the !AppArmor devs if there was anything else needed to help the patch review for his patches. They responded "more time" | |
Line 61: | Line 67: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-01-12-17.12.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-02-23-16.36.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Feb 23rd 2015 16:36 UTC
End: 17:04 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
Agenda
- Announcements
Chris Pollock provided a debdiff for lucid for ClamAV (LP: #1420819). Your work is very much appreciated and will keep Ubuntu users secure. Great job!
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snappy hardware access
update the SnappyConfinement spec
discuss overlayfs and AppArmor in regards to snappy
- review tool changes
- mdeslaur
- weekly role: bug triage
- publish Samba updates
- publish e2fsprogs updates
- publish ca-certificates updates
- start on freetype updates
- sbeattie
- weekly role: cve triage
- request sponsorship of apparmor and apparmor-easyprof-ubuntu updates in Vivid
- testing gcc-5 packages that have pie by default set
- tyhicks
- weekly role: happy place
- retest and publish ecryptfs-utils security updates
- review and test an eCryptfs kernel fix
- triage an eCryptfs data loss bug on btrfs
- propose v2 of the libapparmor API changes
review some overlayfs related changes that went into 4.0-rc1 that may affect AppArmor
- jjohansen
- triage failing fd inheritance tests on krillin (LP: #1423810)
- get verification of the LP: #1408833 fix and push it to the kernel team
- v2 libapparmor API review
AppArmor kernel cleanups and upstreaming
- sarnold
- weekly role: community
- several MIRs at the server team's request
- test and publish Horizon security update
- discussions about the ppc64-diag MIR
- chriscoulson
- Firefox and Thunderbird updates
- Embargoed stuff
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-02-23-16.36.moin.txt
MeetingLogs/Security/20150420 (last edited 2015-04-20 17:00:43 by tyhicks)