20160418
2565
Comment:
|
← Revision 8 as of 2016-04-18 17:00:24 ⇥
2485
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
== Meeting (DRAFT) == | == Meeting == |
Line 4: | Line 4: |
* '''When''': Mon Apr 18th 2016 16:30 UTC * '''End''': 16:50 UTC |
* '''When''': Mon Apr 18th 2016 16:34 UTC * '''End''': 16:59 UTC |
Line 26: | Line 26: |
* fix udev db and cgroup handling in the ubuntu-core-launcher * seccomp arg filtering in ubuntu-core-launcher * policy updates for Ubuntu Core 16.04 * assisting interfaces transition * snappy on classic policy |
* documentation updates for snappy on 16.04 * assisting with policy/interfaces for snappy dimension on classic * includes interfaces testing * embargoed issue * short week |
Line 33: | Line 33: |
* patch piloting * embargoed issue |
* samba updates * optipng updates * php5 updates |
Line 37: | Line 38: |
* glibc updates * kernel USN |
* testing glibc updates * kernel cve triage |
Line 40: | Line 41: |
* PIE by default preparation for x+1 | |
Line 42: | Line 44: |
* ubuntu-core-launcher code reviews | |
Line 44: | Line 45: |
* encrypted swap installer bug | |
Line 45: | Line 47: |
* help with reviews or updates | |
Line 46: | Line 49: |
* !AppArmor stacking * pull request for upstream of bug fixes * fix !AppArmor 3.5 bugs in 16.04 * 3.5 fixes backported to earlier releases |
* !AppArmor kernel bug fixes * finalizing, testing, upstreaming * fix !AppArmor stacking 3.5 bugs in 16.04 |
Line 52: | Line 54: |
* neutron-vpnaas MIR * aodh MIR * barbican MIR * designate MIR * test drive !AppArmor stacking in 16.04 |
* MIR security reviews * !AppArmor patch reviews |
Line 58: | Line 57: |
* improve automated testing of Oxide * compiled unit tests of the API * framework for writing new unit tests for internal classes * look into how to support the new scroll bar design requirements |
* Oxide update * chromium-browser sponsoring |
Line 63: | Line 60: |
* Update Firefox packaging for https://bugzilla.mozilla.org/show_bug.cgi?id=1256955 * Oxide shutdown bug (LP: #1570996) |
|
Line 70: | Line 69: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2016/ubuntu-meeting-2.2016-04-11-16.34.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-04-18-16.34.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 18th 2016 16:34 UTC
End: 16:59 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
ChrisCoulson
Not present
- none
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- documentation updates for snappy on 16.04
- assisting with policy/interfaces for snappy dimension on classic
- includes interfaces testing
- embargoed issue
- short week
- mdeslaur
- weekly role: happy place
- samba updates
- optipng updates
- php5 updates
- sbeattie
- weekly role: community
- testing glibc updates
- kernel cve triage
AppArmor patch review
- PIE by default preparation for x+1
- tyhicks
- weekly role: bug triage
- eCryptfs kernel patch review
- encrypted swap installer bug
- Touch triaging/updates
- help with reviews or updates
- jjohansen
AppArmor kernel bug fixes
- finalizing, testing, upstreaming
fix AppArmor stacking 3.5 bugs in 16.04
- sarnold
- weekly role: cve triage
- MIR security reviews
AppArmor patch reviews
ChrisCoulson
- Oxide update
- chromium-browser sponsoring
- Firefox update
Update Firefox packaging for https://bugzilla.mozilla.org/show_bug.cgi?id=1256955
- Oxide shutdown bug (LP: #1570996)
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-04-18-16.34.moin.txt
MeetingLogs/Security/20160418 (last edited 2016-04-18 17:00:24 by tyhicks)