20160222

Differences between revisions 25 and 46 (spanning 21 versions)
Revision 25 as of 2015-12-14 16:24:19
Size: 3014
Editor: tyhicks
Comment:
Revision 46 as of 2016-02-22 16:55:16
Size: 2751
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20151130
## page was copied from MeetingLogs/Security/
20151123
## page was copied from MeetingLogs/Security/20160208
Line 5: Line 4:
 * '''When''': Mon Nov 30th 2015 16:31 UTC
 * '''End''': 16:59 UTC
 * '''When''': Mon Feb 22nd 2016 16:36 UTC
 * '''End''': 16:54 UTC
Line 15: Line 14:
 * jjohansen
Line 17: Line 15:
 * chrisccoulson  * !ChrisCoulson
Line 20: Line 18:
 * None  * jjohansen
Line 24: Line 22:
  * Stefan Bader (smb) provided a debdiff for precise for xen
  * Andreas Cadhalpun provided a debdiff for wily for ffmpeg
  * Gianfranco Costamagna (locutusofborg) provided debdiffs for precise-wily for virtualbox-guest-additions-iso and a debdiff for wily for virtualbox-ext-pack (LP: #1540243)
  * Vlad Orlov (monsta) provided debdiffs for precise-xenial for gtk+2.0 (LP: #1540811)
Line 28: Line 26:
   * catching up from last week's holiday
   * Snappy sprint prep
   * embargoed item
   * finish up policy work on touch and snappy
   * finish squashfs snappy store checks
   * snappy skills work
   * embargoed issue
Line 33: Line 30:
   * weekly role: happy place
   * cpio update
   * test new ca-certificates and related package updates in the security-proposed ppa
   * backport newer sudo to stable releases to fix the time issue
  * sbeattie
Line 34: Line 36:
   * gnutls26 update
   * investigating an NSS issue in xenial
    * requires getting uvt to work properly in xenial
   * possibly sudo updates to fix the clock issue in stable releases
  * sbeattie
   * kernel updates
   * embargoed issue
   * finish GCC PIE summary email
   * some !AppArmor tasks
  * tyhicks
Line 40: Line 42:
   * figuring out where to disable -fPIE for kernel builds
   * openjdk-6 update
  * tyhicks
   * !AppArmor stacking
    * finish the parser changes needed for stacking
   * Fix eCryptfs parallel copy file corruption bug (LP: #1543633)
  {{{#!wiki comment
  * jjohansen
   * !AppArmor stacking
  }}}
  * sarnold
Line 44: Line 51:
   * send off findings from mapplauncherd review
    * including the code changes and profile generation bits for confining the
      generic booster processes
   * Snappy sprint prep
   * Review snapd socket access checks
   * !AppArmor policy loads inside of a user namespace
  * jjohansen
   * kernel work on !AppArmor stacking/namespaces and related items
   * followup on test kernels containing fix for bug 1446906
   * work with kernel team regarding an !AppArmor related bug that is causing test failures
    * potentially a test issue and not a bug
   * 4.4 !AppArmor rebase
  * sarnold
   * weekly role: happy place
   * libmicrohttpd MIR
   * DPDK MIR
   * finish linux-zfs MIR
   * fwupd and fwupdate MIRs
    * fwupdate review is a re-review of a previous MIR that sarnold performed
Line 61: Line 55:
  * chriscoulson
   * finish camera support in the phone browser
    * need libhybris changes to be reviewed
   * unprivileged namespace sandbox support (LP: #1447345)
   * Oxide merge proposal reviews
  * !ChrisCoulson
   * Oxide updates
   * Thunderbird updates
   * Convergence related tasks
    * https://blueprints.launchpad.net/oxide/+spec/converged-device-support
   * embargoed issues
Line 70: Line 65:
  * None   * None
Line 73: Line 68:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-11-30-16.31.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-02-22-16.36.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Feb 22nd 2016 16:36 UTC

  • End: 16:54 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • sarnold
  • ChrisCoulson

Not present

  • jjohansen

Agenda

  • Announcements
    • Gianfranco Costamagna (locutusofborg) provided debdiffs for precise-wily for virtualbox-guest-additions-iso and a debdiff for wily for virtualbox-ext-pack (LP: #1540243)
    • Vlad Orlov (monsta) provided debdiffs for precise-xenial for gtk+2.0 (LP: #1540811)
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • finish squashfs snappy store checks
      • snappy skills work
      • embargoed issue
    • mdeslaur
      • weekly role: happy place
      • cpio update
      • test new ca-certificates and related package updates in the security-proposed ppa
      • backport newer sudo to stable releases to fix the time issue
    • sbeattie
      • weekly role: community
      • kernel updates
      • embargoed issue
      • finish GCC PIE summary email
      • some AppArmor tasks

    • tyhicks
      • weekly role: bug triage
      • AppArmor stacking

        • finish the parser changes needed for stacking
      • Fix eCryptfs parallel copy file corruption bug (LP: #1543633)
    • sarnold
      • weekly role: cve triage
      • finish linux-zfs MIR
      • fwupd and fwupdate MIRs
        • fwupdate review is a re-review of a previous MIR that sarnold performed
      • AppArmor patch review

    • ChrisCoulson

  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-02-22-16.36.moin.txt

MeetingLogs/Security/20160222 (last edited 2016-02-22 16:55:16 by tyhicks)