20160201

Differences between revisions 23 and 40 (spanning 17 versions)
Revision 23 as of 2015-11-30 17:00:31
Size: 2967
Editor: tyhicks
Comment:
Revision 40 as of 2016-02-01 16:29:39
Size: 2870
Editor: tyhicks
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from MeetingLogs/Security/20151123 ## page was copied from MeetingLogs/Security/20160125
Line 4: Line 4:
 * '''When''': Mon Nov 30th 2015 16:31 UTC  * '''When''': Mon Feb 01st 2016 16:35 UTC
Line 23: Line 23:
  * Stefan Bader (smb) provided a debdiff for precise for xen
  * Andreas Cadhalpun provided a debdiff for wily for ffmpeg
  * Gianfranco Costamagna (LocutusOfBorg) provided debdiffs for trusty-wily for virtualbox (LP: #1538115)
  * Otto Kekäläinen provided debdiffs for mariadb-5.5 (trusty, LP: #1524704) and mariadb-10.0 (vivid, wily, LP: #1538315)
Line 27: Line 27:
   * catching up from last week's holiday
   * Snappy sprint prep
   * embargoed item
   * finish up policy work on touch and snappy
   * improve security team tooling to track 15.04 overlay PPAs since 15.04 is going EOL soon
    * Ubuntu Touch will remain on 15.04 for some time
    * Ubuntu Core will remain on 15.04 until 16.04 is released
   * embargoed issues
   * snappy work items
    * support squashfs image checks in the review tools
Line 32: Line 34:
   * weekly role: happy place
   * mysql updates
   * embargoed updates
  * sbeattie
Line 33: Line 39:
   * gnutls26 update
   * investigating an NSS issue in xenial
    * requires getting uvt to work properly in xenial
   * possibly sudo updates to fix the clock issue in stable releases
  * sbeattie
   * embargoed issue
   * gcc-pie churn
    * review test failures from doko's test pie build
    * finish work to fix the kernel build to disable pie
   * upstream !AppArmor patch review
   * QRT test failures for s390x
  * tyhicks
Line 39: Line 47:
   * figuring out where to disable -fPIE for kernel builds
   * openjdk-6 update
  * tyhicks
   * !AppArmor stacking
    * drive the AppArmor stacking interface designs in libapparmor and securityfs
    * create easy to use namespace creation APIs and binutils
  * jjohansen
   * !AppArmor stacking development
  * sarnold
Line 43: Line 54:
   * send off findings from mapplauncherd review
    * including the code changes and profile generation bits for confining the
      generic booster processes
   * Snappy sprint prep
   * Review snapd socket access checks
   * !AppArmor policy loads inside of a user namespace
  * jjohansen
   * kernel work on !AppArmor stacking/namespaces and related items
   * followup on test kernels containing fix for bug 1446906
   * work with kernel team regarding an !AppArmor related bug that is causing test failures
    * potentially a test issue and not a bug
   * 4.4 !AppArmor rebase
  * sarnold
   * weekly role: happy place
   * libmicrohttpd MIR
   * contribute to the AppArmor stacking discussion
Line 59: Line 56:
   * !AppArmor patch review
  * chriscoulson
   * finish camera support in the phone browser
    * need libhybris changes to be reviewed
   * unprivileged namespace sandbox support (LP: #1447345)
   * Oxide merge proposal reviews
   * pick up another MIR
  * !ChrisCoulson
   * Firefox update
   * Oxide drag and drop support (LP: #1459830)
   * Oxide 1.13 [[https://launchpad.net/oxide/+milestone/branch-1.13|milestones]]
Line 69: Line 65:
  * None   * None
Line 72: Line 68:
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2015/ubuntu-meeting.2015-11-30-16.31.moin.txt Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-01-25-16.35.moin.txt

Meeting (DRAFT)

  • Who: SecurityTeam

  • When: Mon Feb 01st 2016 16:35 UTC

  • End: 16:59 UTC

  • Where: #ubuntu-meeting on irc.freenode.net

  • Chaired By: Tyler Hicks (tyhicks)

Attendance

  • jdstrand
  • mdeslaur
  • sbeattie
  • tyhicks
  • jjohansen
  • sarnold
  • chrisccoulson

Not present

  • None

Agenda

  • Announcements
    • Gianfranco Costamagna (LocutusOfBorg) provided debdiffs for trusty-wily for virtualbox (LP: #1538115)

    • Otto Kekäläinen provided debdiffs for mariadb-5.5 (trusty, LP: #1524704) and mariadb-10.0 (vivid, wily, LP: #1538315)
  • Weekly stand-up report (each member discusses any pending and planned future work for the week)
    • jdstrand
      • improve security team tooling to track 15.04 overlay PPAs since 15.04 is going EOL soon
        • Ubuntu Touch will remain on 15.04 for some time
        • Ubuntu Core will remain on 15.04 until 16.04 is released
      • embargoed issues
      • snappy work items
        • support squashfs image checks in the review tools
    • mdeslaur
      • weekly role: happy place
      • mysql updates
      • embargoed updates
    • sbeattie
      • weekly role: community
      • embargoed issue
      • gcc-pie churn
        • review test failures from doko's test pie build
        • finish work to fix the kernel build to disable pie
      • upstream AppArmor patch review

      • QRT test failures for s390x
    • tyhicks
      • weekly role: bug triage
      • AppArmor stacking

        • drive the AppArmor stacking interface designs in libapparmor and securityfs

        • create easy to use namespace creation APIs and binutils
    • jjohansen
      • AppArmor stacking development

    • sarnold
      • weekly role: cve triage
      • contribute to the AppArmor stacking discussion

      • DPDK MIR
      • pick up another MIR
    • ChrisCoulson

      • Firefox update
      • Oxide drag and drop support (LP: #1459830)
      • Oxide 1.13 milestones

  • Highlighted packages

    The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:

    The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.

  • Miscellaneous and Questions
    • None

Log

Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2016/ubuntu-meeting.2016-01-25-16.35.moin.txt

MeetingLogs/Security/20160201 (last edited 2016-02-01 16:51:01 by tyhicks)