20150504
|
Size: 3167
Comment:
|
← Revision 53 as of 2015-05-04 17:08:53 ⇥
Size: 2832
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20150330 | ## page was copied from MeetingLogs/Security/20150427 ## page was copied from MeetingLogs/Security/20150420 |
| Line 3: | Line 4: |
| == Meeting (DRAFT) == | == Meeting == |
| Line 5: | Line 6: |
| * '''When''': Mon Apr 6th 2015 16:30 UTC * '''End''': 17:00 UTC |
* '''When''': Mon May 4th 2015 16:33 UTC * '''End''': 16:58 UTC |
| Line 8: | Line 9: |
| * '''Chaired By''': Tyler Hicks (tyhicks) | * '''Chaired By''': Jamie Strandboge (jdstrand) |
| Line 12: | Line 13: |
| * mdeslaur | |
| Line 13: | Line 15: |
| * tyhicks | * jjohansen |
| Line 15: | Line 17: |
| * chrisccoulson | |
| Line 17: | Line 20: |
| * mdeslaur * jjohansen * chrisccoulson |
* tyhicks |
| Line 23: | Line 24: |
| * Johan Van de Wauw (johanvdw) provided debdiffs for trusty-vivid for postgis (LP: #1438875) | * Andreas Cadhalpun (andreas-cadhalpun) provided a debdiff for vivid for ffmpeg (LP: #1436296) * Unit 193 (unit193) provided a debdiff for trusty and utopic for icecast2 (LP: #1449771) * Felix Geyer (debfx) provided debdiffs for trusty-vivid for pdns (LP: #1450037) * Weekly stand-up report (each member discusses any pending and planned future work for the week) |
| Line 25: | Line 29: |
| {{{#!wiki comment * Review mvo's framework policies branch for snappy * Review tools updates * Review mvo's seccomp launcher branch * Prepare snappy seccomp policy * Embargoed item }}} {{{#!wiki comment |
* attend UOS * seccomp SRU * seccomp policy regeneration on policy updates * ubuntu-core-security SRU * review tools updates for snaps |
| Line 34: | Line 35: |
| * short week | |
| Line 35: | Line 37: |
| * Patch piloting * tiff updates * gnupg/libgcrypt updates }}} |
* pending updates |
| Line 41: | Line 40: |
| {{{#!wiki comment * AppArmor patch review * Continue testing of gcc-5 pie-on-amd64 packages }}} |
* attend UOS * apparmor and rsyslog SRU * apparmor upload for wiley (will look at the recent Debian upload for that) * gcc pie testing (few more test rebuilds, then can proceed with benchnmarking) {{{#!wiki comment |
| Line 46: | Line 46: |
| * weekly role: bug triage * systemd/sbuild/schroot/kernel bugs (LP: #1427264) (LP: #1438942) (LP: #1439849) * Restart work on AppArmor kernel keyring mediation for user data encryption * Finish up the patches to fix bug #1430532 and send them out for review * python-cryptography MIR (LP: #1430082) * sarnold may do the MIR {{{#!wiki comment * Make final fixups for libapparmor policy cache API changes * Review the initial snappy launcher code }}} {{{#!wiki comment |
* weekly role: cve triage * circle back to a number of things that were ignored during the ramp up to the Vivid release * finish kernel patches for AppArmor kernel keyring mediation }}} |
| Line 58: | Line 51: |
| * Post-vacation catch up * AppArmor patch review * Kernel security update workflow * AppArmor kernel cleanups and upstreaming * Find a tester for a potention fix of bug #1430546 * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing }}} |
* cleaning up the domain transition bits and hunting bugs, improving, extending or writing new regression tests around that |
| Line 66: | Line 53: |
| * weekly role: cve triage {{{#!wiki comment * OpenStack security updates * Outstanding MIR requests * SRU fix testing }}} {{{#!wiki comment |
* weekly role: triage * OpenStack security updates: still having issues with charms in testing lab, but working through them * attend UOS |
| Line 74: | Line 57: |
| * Mozilla updates * Get Firefox buildable again in 12.04 (Mozilla bumped the GCC requirement to version 4.7) * Work on 'Persist permission request decisions for a session' (LP: #1428754) * Work on bug #1410996 and bug #1422920 }}} |
* short week * branch reviews (eg, camera) * media-permissions branch |
| Line 85: | Line 66: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-30-16.32.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-05-04-16.38.moin.txt |
Meeting
Who: SecurityTeam
When: Mon May 4th 2015 16:33 UTC
End: 16:58 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Jamie Strandboge (jdstrand)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- jjohansen
- sarnold
- chrisccoulson
Not present
- tyhicks
Agenda
- Announcements
- Andreas Cadhalpun (andreas-cadhalpun) provided a debdiff for vivid for ffmpeg (LP: #1436296)
- Unit 193 (unit193) provided a debdiff for trusty and utopic for icecast2 (LP: #1449771)
- Felix Geyer (debfx) provided debdiffs for trusty-vivid for pdns (LP: #1450037)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- attend UOS
- seccomp SRU
- seccomp policy regeneration on policy updates
- ubuntu-core-security SRU
- review tools updates for snaps
- mdeslaur
- short week
- weekly role: happy place
- pending updates
- sbeattie
- weekly role: community
- attend UOS
- apparmor and rsyslog SRU
- apparmor upload for wiley (will look at the recent Debian upload for that)
- gcc pie testing (few more test rebuilds, then can proceed with benchnmarking)
- jjohansen
- cleaning up the domain transition bits and hunting bugs, improving, extending or writing new regression tests around that
- sarnold
- weekly role: triage
OpenStack security updates: still having issues with charms in testing lab, but working through them
- attend UOS
- chriscoulson
- short week
- branch reviews (eg, camera)
- media-permissions branch
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-05-04-16.38.moin.txt
MeetingLogs/Security/20150504 (last edited 2015-05-04 17:08:53 by jdstrand)