20150608
|
Size: 3167
Comment:
|
← Revision 67 as of 2015-06-08 17:25:56 ⇥
Size: 2840
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20150330 | ## page was copied from MeetingLogs/Security/20150601 |
| Line 3: | Line 3: |
| == Meeting (DRAFT) == | == Meeting == |
| Line 5: | Line 5: |
| * '''When''': Mon Apr 6th 2015 16:30 UTC * '''End''': 17:00 UTC |
* '''When''': Mon June 8th 2015 16:59 UTC * '''End''': 17:23 UTC |
| Line 12: | Line 12: |
| * mdeslaur | |
| Line 14: | Line 15: |
| * jjohansen | |
| Line 15: | Line 17: |
| * chrisccoulson | |
| Line 17: | Line 20: |
| * mdeslaur * jjohansen * chrisccoulson |
* None |
| Line 23: | Line 24: |
| * Johan Van de Wauw (johanvdw) provided debdiffs for trusty-vivid for postgis (LP: #1438875) | * None * Weekly stand-up report (each member discusses any pending and planned future work for the week) |
| Line 25: | Line 27: |
| {{{#!wiki comment * Review mvo's framework policies branch for snappy * Review tools updates * Review mvo's seccomp launcher branch * Prepare snappy seccomp policy * Embargoed item }}} {{{#!wiki comment |
* snappy review tools upload * embargoed item * properly handle seccomp policy upgrades on snappy |
| Line 34: | Line 31: |
| * weekly role: cve triage * embargoed issues * other updates * sbeattie |
|
| Line 35: | Line 36: |
| * Patch piloting * tiff updates * gnupg/libgcrypt updates }}} * sbeattie * weekly role: community {{{#!wiki comment * AppArmor patch review * Continue testing of gcc-5 pie-on-amd64 packages |
* !AppArmor patch review * testing the apparmor 14.04 SRU * prepare another apparmor SRU for bug 1460152 {{{!wiki comment * gcc pie testing (few more test rebuilds, then can proceed with benchmarking) |
| Line 46: | Line 43: |
| * weekly role: community * ubuntu-core-launcher merge proposal reviews * return to the patch updates * add kernel keyring mediation support to !AppArmor parser * !AppArmor patch review and revise one of my patches so we can wrap up the 2.10 release * embargoed items (2) * jjohansen * finish !AppArmor 2.10 patch reviews/responses * !AppArmor monthly meeting * put together the pull requests for bug 1430546 * kernel updates * Continue work to upstream the Ubuntu !AppArmor kernel delta * Advising on the work to add dconf mediation to !AppArmor * sarnold |
|
| Line 47: | Line 58: |
| * systemd/sbuild/schroot/kernel bugs (LP: #1427264) (LP: #1438942) (LP: #1439849) * Restart work on AppArmor kernel keyring mediation for user data encryption * Finish up the patches to fix bug #1430532 and send them out for review * python-cryptography MIR (LP: #1430082) * sarnold may do the MIR {{{#!wiki comment * Make final fixups for libapparmor policy cache API changes * Review the initial snappy launcher code }}} {{{#!wiki comment * jjohansen * Post-vacation catch up * AppArmor patch review * Kernel security update workflow * AppArmor kernel cleanups and upstreaming * Find a tester for a potention fix of bug #1430546 * Followup with kernel team regarding the bug #1423810 and #1423810 fixes landing }}} * sarnold * weekly role: cve triage {{{#!wiki comment * OpenStack security updates * Outstanding MIR requests * SRU fix testing }}} {{{#!wiki comment |
* determining the !OpenStack CVE status after the server team uploads landed * !OpenStack security updates * !AppArmor patch reviews and/or SRU testing |
| Line 74: | Line 62: |
| * Mozilla updates * Get Firefox buildable again in 12.04 (Mozilla bumped the GCC requirement to version 4.7) * Work on 'Persist permission request decisions for a session' (LP: #1428754) * Work on bug #1410996 and bug #1422920 }}} |
* sponsoring chromium-browser updates * oxide merge reviews * finish changes for bug 1428754 * working on oxide 1.9 milestones |
| Line 83: | Line 70: |
| * None | |
| Line 85: | Line 73: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-03-30-16.32.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-06-08-16.59.moin.txt |
Meeting
Who: SecurityTeam
When: Mon June 8th 2015 16:59 UTC
End: 17:23 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
- None
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snappy review tools upload
- embargoed item
- properly handle seccomp policy upgrades on snappy
- mdeslaur
- weekly role: cve triage
- embargoed issues
- other updates
- sbeattie
- weekly role: happy place
AppArmor patch review
- testing the apparmor 14.04 SRU
- prepare another apparmor SRU for bug 1460152 {{{!wiki comment
- gcc pie testing (few more test rebuilds, then can proceed with benchmarking) }}}
- tyhicks
- weekly role: community
- ubuntu-core-launcher merge proposal reviews
- return to the patch updates
add kernel keyring mediation support to AppArmor parser
AppArmor patch review and revise one of my patches so we can wrap up the 2.10 release
- embargoed items (2)
- jjohansen
finish AppArmor 2.10 patch reviews/responses
AppArmor monthly meeting
- put together the pull requests for bug 1430546
- kernel updates
Continue work to upstream the Ubuntu AppArmor kernel delta
Advising on the work to add dconf mediation to AppArmor
- sarnold
- weekly role: bug triage
determining the OpenStack CVE status after the server team uploads landed
OpenStack security updates
AppArmor patch reviews and/or SRU testing
- chriscoulson
- sponsoring chromium-browser updates
- oxide merge reviews
- finish changes for bug 1428754
- working on oxide 1.9 milestones
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-06-08-16.59.moin.txt
MeetingLogs/Security/20150608 (last edited 2015-06-08 17:25:56 by tyhicks)