20160321

Differences between revisions 21 and 24 (spanning 3 versions)
Revision 21 as of 2015-11-30 15:49:30
Size: 2819
Editor: tyhicks
Comment:
Revision 24 as of 2015-11-30 17:27:20
Size: 2959
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
## page was copied from MeetingLogs/Security/20151116
Line 5: Line 4:
 * '''When''': Mon Nov 23rd 2015 16:32 UTC
 * '''End''': 16:46 UTC
 * '''When''': Mon Nov 30th 2015 16:31 UTC
 * '''End''': 16:59 UTC
Line 11: Line 10:
 * jdstrand
Line 19: Line 19:
 * jdstrand  * None
Line 23: Line 23:
  * Andrew Starr-Bochicchio (asomething) provided debdiffs for trusty-wily for libpng (LP: #1516592)
  * Bas Couwenberg (sebastic) provided debdiffs for trusty-vivid for freexl (LP: #1516257)
  * Stefan Bader (smb) provided a debdiff for precise for xen
  * Andreas Cadhalpun provided a debdiff for wily for ffmpeg
Line 26: Line 26:
  {{{#!wiki comment
Line 28: Line 27:
   * book sprint travel
   * interviewing candidates for FIPS/CC lead position
   * Snappy security policy generation
    * reviewing merges
    * finishing the feature development
   * Ubuntu Core Sprint followups
  }}}
   * catching up from last week's holiday
   * Snappy sprint prep
   * embargoed item
   * finish up policy work on touch and snappy
Line 36: Line 32:
   * weekly role: community
   * gnutls26 update
   * investigating an NSS issue in xenial
    * requires getting uvt to work properly in xenial
   * possibly sudo updates to fix the clock issue in stable releases
  * sbeattie
Line 37: Line 39:
   * icedtea-web updates
   * embargoed issue
  * sbeattie
   * figuring out where to disable -fPIE for kernel builds
   * openjdk-6 update
  * tyhicks
Line 41: Line 43:
   * investigate build failures after building main rebuild with PIE enabled by default
   * openjdk-7 packages to test
  * tyhicks
   * send off findings from mapplauncherd review
    * including the code changes and profile generation bits for confining the
      generic booster processes
   * Snappy sprint prep
   * Review snapd socket access checks
   * !AppArmor policy loads inside of a user namespace
  * jjohansen
   * kernel work on !AppArmor stacking/namespaces and related items
   * followup on test kernels containing fix for bug 1446906
   * work with kernel team regarding an !AppArmor related bug that is causing test failures
    * potentially a test issue and not a bug
   * 4.4 !AppArmor rebase
  * sarnold
Line 45: Line 57:
   * finish mapplauncherd review and profile development
   * !AppArmor policy loads inside of a user namespace
   * Snappy sprint prep
  * jjohansen
   * finish fix for bug 1446906
   * get other kernel bug fixes out for review
   * kernel work on !AppArmor stacking/namespaces and related items
  * sarnold
   * weekly role: community
Line 56: Line 59:
   * !AppArmor kernel patch review    * !AppArmor patch review
Line 58: Line 61:
   * chromium-browser update sponsoring
   * Thunderbird update
   * finish camera support in the phone browser
    * need libhybris changes to be reviewed
   * unprivileged namespace sandbox support (LP: #1447345)
Line 61: Line 65:
   * finish camera support in the phone browser
   * unprivileged namespace sandbox support (LP: #1447345)
Line 70: Line 72:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-11-23-16.32.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-11-30-16.31.moin.txt

Meeting

  • Who: SecurityTeam

  • When: Mon Nov 30th 2015 16:31 UTC

  • End: 16:59 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • chrisccoulson

Not present

  • None

Agenda

  • Announcements
    • Stefan Bader (smb) provided a debdiff for precise for xen
    • Andreas Cadhalpun provided a debdiff for wily for ffmpeg
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • catching up from last week's holiday
      • Snappy sprint prep
      • embargoed item
      • finish up policy work on touch and snappy
    • mdeslaur
      • weekly role: community
      • gnutls26 update
      • investigating an NSS issue in xenial
        • requires getting uvt to work properly in xenial
      • possibly sudo updates to fix the clock issue in stable releases
    • sbeattie
      • weekly role: bug triage
      • figuring out where to disable -fPIE for kernel builds
      • openjdk-6 update
    • tyhicks
      • weekly role: cve triage
      • send off findings from mapplauncherd review
        • including the code changes and profile generation bits for confining the
          • generic booster processes
      • Snappy sprint prep
      • Review snapd socket access checks
      • AppArmor policy loads inside of a user namespace

    • jjohansen
      • kernel work on AppArmor stacking/namespaces and related items

      • followup on test kernels containing fix for bug 1446906
      • work with kernel team regarding an AppArmor related bug that is causing test failures

        • potentially a test issue and not a bug
      • 4.4 AppArmor rebase

    • sarnold
      • weekly role: happy place
      • libmicrohttpd MIR
      • DPDK MIR
      • AppArmor patch review

    • chriscoulson
      • finish camera support in the phone browser
        • need libhybris changes to be reviewed
      • unprivileged namespace sandbox support (LP: #1447345)
      • Oxide merge proposal reviews
  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-11-30-16.31.moin.txt

MeetingLogs/Security/20160321 (last edited 2016-03-21 16:57:58 by tyhicks)