20150511

Differences between revisions 43 and 57 (spanning 14 versions)
Revision 43 as of 2015-04-20 16:10:11
Size: 2754
Editor: tyhicks
Comment:
Revision 57 as of 2015-05-11 19:36:28
Size: 2854
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20150413
## page was copied from MeetingLogs/Security/201
50406
## page was copied from MeetingLogs/Security/20150504
Line 6: Line 5:
 * '''When''': Mon Apr 13th 2015 16:37 UTC
 * '''End''': 17:00 UTC
 * '''When''': Mon May 11th 2015 16:38 UTC
 * '''End''': 17:05 UTC
Line 21: Line 20:
 * All present
Line 24: Line 24:
  * Johan Van de Wauw (johanvdw) provided debdiffs for trusty-vivid for freexl (LP: #1437087)
  * Thomas Ward (teward) provided a debdiff for utopic for wireshark (LP: #1440202)
  * Stefan Bader (smb) provided debdiffs for trusty and utopic for xen

 * Weekly stand-up report (each member discusses any pending and planned future work for the week) 
  * Jonathan Riddell (Riddell) and Felix Geyer (debfx) provided debdiffs for trusty-vivid for quassel (LP: #1448911)
  * Felix Geyer (debfx) provided debdiffs for precise-utopic for unrar-nonfree (LP: #1451260)
 * Weekly stand-up report (each member discusses any pending and planned future work for the week)
Line 29: Line 28:
   * Ubuntu Core sprint
   * Focusing on snappy (seccomp and the review tools)
   * identify and prioritize the Security Team's work backlog
   * work on review tools for Snappy
   * discuss Snappy stable updates with other teams
Line 33: Line 33:
   * ntp updates
   * several updates related to a libx11 issue
   * libtasn1 and icu updates are out the door
   * pending security updates
Line 38: Line 38:
   * AppArmor patch review
   * Prepare for Trusty SRU of AppArmor python utils
   * Continue testing of gcc-5 pie-on-amd64 packages
   * apparmor upload for wiley (will look at the recent Debian upload for that)
   * apparmor 12.04 SRU
   * gcc pie testing (few more test rebuilds, then can proceed with benchnmarking)
Line 43: Line 43:
   * Vivid systemd/sbuild/schroot bugs (LP: #1427264) (LP: #1438942)
   * Restart work on AppArmor kernel keyring mediation for user data encryption
   * Send out the patches to fix bug #1430532
   * identify and prioritize the Security Team's work backlog
   * patch security updates
   * add kernel keyring mediation support to AppArmor parser
Line 47: Line 47:
   * AppArmor kernel cleanups and upstreaming
   * Embargoed issue
Line 50: Line 48:
   * Make sure that 4.1-rc3 is ready for Wily in regards to AppArmor
   * Prepare pull AppArmor request to get patches into 4.2
Line 51: Line 51:
  * weekly role: bug triage
    * python-cryptography MIR (LP: #1430082)
    
* OpenStack security updates
* conntrack MIR
   * weekly role: bug triage
   * OpenStack security updates: updates for 12.04 and newer should be doable this week
Line 56: Line 54:
    * Oxide updates
    * Embargoed issue
    * Get Firefox buildable again in 12.04 (Mozilla bumped the GCC requirement to version 4.7)
    * Oxide bugs
   * Mozilla update week
   * embargoed update
   * merge media-permissions branch
   * work on "Persist permission request decisions for a session" (LP: #1428754)
   * Oxide code reviews
Line 66: Line 65:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-04-13-16.37.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-05-11-16.38.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon May 11th 2015 16:38 UTC

  • End: 17:05 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • chrisccoulson

Not present

  • All present

Agenda

  • Announcements
    • Jonathan Riddell (Riddell) and Felix Geyer (debfx) provided debdiffs for trusty-vivid for quassel (LP: #1448911)
    • Felix Geyer (debfx) provided debdiffs for precise-utopic for unrar-nonfree (LP: #1451260)
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • identify and prioritize the Security Team's work backlog
      • work on review tools for Snappy
      • discuss Snappy stable updates with other teams
    • mdeslaur
      • weekly role: cve triage
      • libtasn1 and icu updates are out the door
      • pending security updates
      • embargoed issue
    • sbeattie
      • weekly role: happy place
      • apparmor upload for wiley (will look at the recent Debian upload for that)
      • apparmor 12.04 SRU
      • gcc pie testing (few more test rebuilds, then can proceed with benchnmarking)
    • tyhicks
      • weekly role: community
      • identify and prioritize the Security Team's work backlog
      • patch security updates
      • add kernel keyring mediation support to AppArmor parser

    • jjohansen
      • Prepare for monthly AppArmor meeting

      • Make sure that 4.1-rc3 is ready for Wily in regards to AppArmor

      • Prepare pull AppArmor request to get patches into 4.2

    • sarnold
      • weekly role: bug triage
      • OpenStack security updates: updates for 12.04 and newer should be doable this week

    • chriscoulson
      • Mozilla update week
      • embargoed update
      • merge media-permissions branch
      • work on "Persist permission request decisions for a session" (LP: #1428754)
      • Oxide code reviews
  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-05-11-16.38.moin.txt

MeetingLogs/Security/20150511 (last edited 2015-05-11 19:36:28 by tyhicks)