20150504
|
Size: 3292
Comment:
|
Size: 3029
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20150406 | ## page was copied from MeetingLogs/Security/20150427 ## page was copied from MeetingLogs/Security/20150420 |
| Line 3: | Line 4: |
| == Meeting (DRAFT) == | == Meeting == |
| Line 5: | Line 6: |
| * '''When''': Mon Apr 13th 2015 16:30 UTC * '''End''': 17:00 UTC |
* '''When''': Mon Apr 27th 2015 16:33 UTC * '''End''': 16:58 UTC |
| Line 11: | Line 12: |
| * jdstrand | |
| Line 20: | Line 20: |
| * jdstrand | |
| Line 23: | Line 24: |
| * Johan Van de Wauw (johanvdw) provided debdiffs for trusty-vivid for freexl (LP: #1437087) * Thomas Ward (teward) provided a debdiff for utopic for wireshark (LP: #1440202) * Stefan Bader (smb) provided debdiffs for trusty and utopic for xen |
* Rhonda D'Vine (rhonda) provided debdiffs for precise-utopic for wesnoth-1.10 (LP: #1445688) |
| Line 27: | Line 26: |
| {{{#!wiki comment | |
| Line 28: | Line 28: |
| {{{#!wiki comment * Write review tool tests for new snappy security yaml * Finish landing the snappy framework policy changes * Write review tool tests for new snappy hashes.yaml * Continue working on snappy seccomp policy }}} |
* Finalizing snappy seccomp glue layer today * Test the applied snappy seccomp policies and update ubuntu-core-security, if necessary * Write code to update already generated snappy seccomp policies when ubuntu-core-security-seccomp is updated * Update snappy build to fail if the package.yaml is malformed when dbus bus-name is specified * Snappy review tools updates }}} |
| Line 35: | Line 35: |
| * weekly role: community * sponsoring ffmpeg * patch piloting * published several updates and have a couple more queued up for testing * finish the openssl precise update to enable tlsv1.2, by default, for clients * sbeattie * weekly role: bug triage * prepare Trusty SRU of AppArmor python utils * AppArmor patch review * continue testing of gcc-5 pie-on-amd64 packages * tyhicks |
|
| Line 36: | Line 47: |
| {{{#!wiki comment * Patch piloting * tiff updates * gnupg/libgcrypt updates }}} * sbeattie |
* circle back to a number of things that were ignored during the ramp up to the Vivid release * finish kernel patches for AppArmor kernel keyring mediation * jjohansen * Backported CVE kernel fixes to discuss with the kernel team * Send AppArmor bug fixes to the kernel team (LP: #1430546 and others) * AppArmor kernel cleanups and upstreaming * Triage new AppArmor kernel oops (LP: #1448912) * sarnold |
| Line 43: | Line 56: |
| {{{#!wiki comment * AppArmor patch review * Prepare for Trusty SRU of AppArmor python utils * Continue testing of gcc-5 pie-on-amd64 packages }}} * tyhicks * weekly role: community * Vivid systemd/sbuild/schroot/kernel bugs (LP: #1427264) (LP: #1438942) * Restart work on AppArmor kernel keyring mediation for user data encryption * Send out the patches to fix bug #1430532 * jjohansen {{{#!wiki comment * Post-vacation catch up * AppArmor patch review * Kernel security update workflow * AppArmor kernel cleanups and upstreaming * Find a tester for a potention fix of bug #1430546 * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing }}} * sarnold * weekly role: bug triage * python-cryptography MIR (LP: #1430082) {{{#!wiki comment * OpenStack security updates * Outstanding MIR requests }}} |
* OpenStack security updates * AppArmor patch reviews |
| Line 70: | Line 59: |
| {{{#!wiki comment * Mozilla updates * Get Firefox buildable again in 12.04 (Mozilla bumped the GCC requirement to version 4.7) * Work on 'Persist permission request decisions for a session' (LP: #1428754) * Work on bug #1410996 and bug #1422920 }}} |
* Chromium update * Oxide code reviews * Triage browser crash on the phone |
| Line 82: | Line 68: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-04-06-16.45.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-04-27-16.33.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Apr 27th 2015 16:33 UTC
End: 16:58 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
- jdstrand
Agenda
- Announcements
- Rhonda D'Vine (rhonda) provided debdiffs for precise-utopic for wesnoth-1.10 (LP: #1445688)
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- mdeslaur
- weekly role: community
- sponsoring ffmpeg
- patch piloting
- published several updates and have a couple more queued up for testing
- finish the openssl precise update to enable tlsv1.2, by default, for clients
- sbeattie
- tyhicks
- weekly role: cve triage
- circle back to a number of things that were ignored during the ramp up to the Vivid release
finish kernel patches for AppArmor kernel keyring mediation
- jjohansen
- sarnold
- chriscoulson
- Chromium update
- Oxide code reviews
- Triage browser crash on the phone
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-04-27-16.33.moin.txt
MeetingLogs/Security/20150504 (last edited 2015-05-04 17:08:53 by jdstrand)