20150608
|
Size: 2751
Comment:
|
← Revision 67 as of 2015-06-08 17:25:56 ⇥
Size: 2840
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 1: | Line 1: |
| ## page was copied from MeetingLogs/Security/20150413 | ## page was copied from MeetingLogs/Security/20150601 |
| Line 5: | Line 5: |
| * '''When''': Mon Apr 20th 2015 16:33 UTC * '''End''': 16:59 UTC |
* '''When''': Mon June 8th 2015 16:59 UTC * '''End''': 17:23 UTC |
| Line 20: | Line 20: |
| * None | |
| Line 23: | Line 24: |
| * Weekly stand-up report (each member discusses any pending and planned future work for the week) | * None * Weekly stand-up report (each member discusses any pending and planned future work for the week) |
| Line 25: | Line 27: |
| * Finalizing snappy seccomp glue layer today * Test the applied snappy seccomp policies and update ubuntu-core-security, if necessary * Write code to update already generated snappy seccomp policies when ubuntu-core-security-seccomp is updated * Update snappy build to fail if the package.yaml is malformed when dbus bus-name is specified * Snappy review tools updates |
* snappy review tools upload * embargoed item * properly handle seccomp policy upgrades on snappy |
| Line 31: | Line 31: |
| * weekly role: cve triage * embargoed issues * other updates * sbeattie * weekly role: happy place * !AppArmor patch review * testing the apparmor 14.04 SRU * prepare another apparmor SRU for bug 1460152 {{{!wiki comment * gcc pie testing (few more test rebuilds, then can proceed with benchmarking) }}} * tyhicks * weekly role: community * ubuntu-core-launcher merge proposal reviews * return to the patch updates * add kernel keyring mediation support to !AppArmor parser * !AppArmor patch review and revise one of my patches so we can wrap up the 2.10 release * embargoed items (2) * jjohansen * finish !AppArmor 2.10 patch reviews/responses * !AppArmor monthly meeting * put together the pull requests for bug 1430546 * kernel updates * Continue work to upstream the Ubuntu !AppArmor kernel delta * Advising on the work to add dconf mediation to !AppArmor * sarnold |
|
| Line 32: | Line 58: |
| * php5 updates * mysql updates * more security updates * sbeattie * weekly role: cve triage * openjdk updates * Do apparmor 2.9.2 release * Prepare for Trusty SRU of AppArmor python utils * Continue testing of gcc-5 pie-on-amd64 packages * tyhicks * weekly role: happy place * Review snappy launcher * Review some snippets at the request of IS * Vivid systemd/sbuild/schroot bugs (LP: #1427264) (LP: #1438942) * Restart work on AppArmor kernel keyring mediation for user data encryption * jjohansen * AppArmor kernel cleanups and upstreaming * Possible help with 2.9.2 and 2.10 apparmor releases * Kernel SRU prep for the current release cycle * sarnold * weekly role: community * OpenStack security updates * AppArmor patch reviews * conntrack MIR |
* determining the !OpenStack CVE status after the server team uploads landed * !OpenStack security updates * !AppArmor patch reviews and/or SRU testing |
| Line 57: | Line 62: |
| * Probable firefox update * Release oxide 1.6 * Oxide code reviews * Oxide bugs |
* sponsoring chromium-browser updates * oxide merge reviews * finish changes for bug 1428754 * working on oxide 1.9 milestones |
| Line 65: | Line 70: |
| * None | |
| Line 67: | Line 73: |
| Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-04-20-16.33.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-06-08-16.59.moin.txt |
Meeting
Who: SecurityTeam
When: Mon June 8th 2015 16:59 UTC
End: 17:23 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- jjohansen
- sarnold
- chrisccoulson
Not present
- None
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- snappy review tools upload
- embargoed item
- properly handle seccomp policy upgrades on snappy
- mdeslaur
- weekly role: cve triage
- embargoed issues
- other updates
- sbeattie
- weekly role: happy place
AppArmor patch review
- testing the apparmor 14.04 SRU
- prepare another apparmor SRU for bug 1460152 {{{!wiki comment
- gcc pie testing (few more test rebuilds, then can proceed with benchmarking) }}}
- tyhicks
- weekly role: community
- ubuntu-core-launcher merge proposal reviews
- return to the patch updates
add kernel keyring mediation support to AppArmor parser
AppArmor patch review and revise one of my patches so we can wrap up the 2.10 release
- embargoed items (2)
- jjohansen
finish AppArmor 2.10 patch reviews/responses
AppArmor monthly meeting
- put together the pull requests for bug 1430546
- kernel updates
Continue work to upstream the Ubuntu AppArmor kernel delta
Advising on the work to add dconf mediation to AppArmor
- sarnold
- weekly role: bug triage
determining the OpenStack CVE status after the server team uploads landed
OpenStack security updates
AppArmor patch reviews and/or SRU testing
- chriscoulson
- sponsoring chromium-browser updates
- oxide merge reviews
- finish changes for bug 1428754
- working on oxide 1.9 milestones
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-06-08-16.59.moin.txt
MeetingLogs/Security/20150608 (last edited 2015-06-08 17:25:56 by tyhicks)