20160321
2463
Comment:
|
2521
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was copied from MeetingLogs/Security/20151214 ## page was copied from MeetingLogs/Security/20151130 |
## page was copied from MeetingLogs/Security/20160307 |
Line 5: | Line 4: |
* '''When''': Mon Dec 14th 2015 16:42 UTC * '''End''': 16:57 UTC |
* '''When''': Mon Mar 14th 2016 16:32 UTC * '''End''': 16:47 UTC |
Line 16: | Line 15: |
* !ChrisCoulson | |
Line 18: | Line 18: |
* chrisccoulson | |
Line 23: | Line 22: |
* Andreas Cadhalpun provided a debdiff for vivid for ffmpeg (LP: #1523692) | * Nick Bryda (futurepilot) provided debdiff for plasma-workspace for wily (LP: #1554656) |
Line 26: | Line 25: |
* catch up email/IRC from last week while attending the Snappy sprint * fix seccomp denial that Mir on Snappy is seeing * update libseccomp for mbarrier syscall * allow mbarrier in ubuntu-core-security * followups from the Snappy sprint (put work into Trello) * start work to support Snappy capabilities * ubuntu-core-security and review tools |
* continue snappy interfaces work * start looking into snappy developer mode * two embargoed issues |
Line 34: | Line 29: |
* weekly role: community * patch piloting * graphite2 updates * exim2 updates * sbeattie * weekly role: bug triage * author kernel USNs * work on GCC pie build failures to prepare debdiffs to sponsor * look at !AppArmor stacking work * cut 2.11 !AppArmor release * requires packaging work for new binutils/ directory in upstream !AppArmor * tyhicks |
|
Line 35: | Line 42: |
* libxml2 updates * git updates |
* !AppArmor stacking * more testing * help land * Fix eCryptfs parallel copy file corruption bug (LP: #1543633) |
Line 38: | Line 47: |
* sbeattie | * jjohansen * !AppArmor stacking * sarnold |
Line 40: | Line 51: |
* embargoed issue * gcc-pie churn * upstream !AppArmor work * tyhicks * weekly role: community * catch up email/IRC from last week while attending the Snappy sprint * followups from the Snappy sprint * ensure that the hwrng is being used in Snappy on the Beagle Bone Black * loose ends (mapplauncherd, etc.) * sarnold * weekly role: bug triage * DPDK MIR * !AppArmor patch review |
* finish fwupd MIR * golang-websocket-dev MIR * !AppArmor reviews * !ChrisCoulson * sponsor chromium-browser updates * Thunderbird updates * Convergence related tasks * https://blueprints.launchpad.net/oxide/+spec/converged-device-support |
Line 57: | Line 63: |
* None | * None |
Line 60: | Line 66: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-12-14-16.42.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-03-14-16.32.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Mar 14th 2016 16:32 UTC
End: 16:47 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
ChrisCoulson
Not present
- jjohansen
Agenda
- Announcements
- Nick Bryda (futurepilot) provided debdiff for plasma-workspace for wily (LP: #1554656)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- continue snappy interfaces work
- start looking into snappy developer mode
- two embargoed issues
- mdeslaur
- weekly role: community
- patch piloting
- graphite2 updates
- exim2 updates
- sbeattie
- weekly role: bug triage
- author kernel USNs
- work on GCC pie build failures to prepare debdiffs to sponsor
look at AppArmor stacking work
cut 2.11 AppArmor release
requires packaging work for new binutils/ directory in upstream AppArmor
- tyhicks
- weekly role: cve triage
AppArmor stacking
- more testing
- help land
- Fix eCryptfs parallel copy file corruption bug (LP: #1543633)
- embargoed issues
- jjohansen
AppArmor stacking
- sarnold
- weekly role: happy place
- finish fwupd MIR
- golang-websocket-dev MIR
AppArmor reviews
ChrisCoulson
- sponsor chromium-browser updates
- Thunderbird updates
- Convergence related tasks
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-03-14-16.32.moin.txt
MeetingLogs/Security/20160321 (last edited 2016-03-21 16:57:58 by tyhicks)