/srv/irclogs.ubuntu.com/2014/07/07/#ubuntu-meeting.txt

=== vladk|offline is now known as vladk
=== vladk is now known as vladk|offline
=== vladk|offline is now known as vladk
=== dholbach_ is now known as dholbach
=== vladk is now known as vladk|offline
=== vladk|offline is now known as vladk
=== ubott2 is now known as ubottu
=== Trevinho_ is now known as Trevinho
=== Adri2000 is now known as Guest67185
=== Guest67185 is now known as Adri2000_
=== doko_ is now known as doko
tyhickshello16:53
sarnoldhello16:53
jdstrandhi!16:53
jdstrand#startmeeting16:54
jdstrandThe meeting agenda can be found at:16:54
jdstrand[LINK] https://wiki.ubuntu.com/SecurityTeam/Meeting16:54
mdeslaurhello!16:54
jdstrand[TOPIC] Announcements16:54
jdstrandAndrew Starr-Bochicchio (andrewsomething) provided a debdiff for trusty for libtorrent-rasterbar (LP: #1330703)16:54
ubottuLaunchpad bug 1330703 in libtorrent-rasterbar (Ubuntu Trusty) "[Security] UPNP opens port 0 which fully exposes PC to the internet." [High,Fix released] https://launchpad.net/bugs/133070316:54
jdstrandJames Page (jamespage) provided an update for trusty for percona-xtradb-cluster-5.5 (LP: #1325916)16:54
ubottuLaunchpad bug 1325916 in percona-xtradb-cluster-5.5 (Ubuntu Utopic) "Update to 5.5.37 for security updates" [Undecided,Fix released] https://launchpad.net/bugs/132591616:54
jdstrandFelix Geyer (debfx) provided a debdiff for trusty for mumble (LP: #1335597)16:54
ubottuLaunchpad bug 1335597 in mumble (Ubuntu Saucy) "CVE-2014-3755 and CVE-2014-3756" [Undecided,Confirmed] https://launchpad.net/bugs/133559716:54
jdstrandLouis Bouchard (caribou) provided a debdiff for precise-utopic for openssl098 (LP: #1331452)16:54
ubottuLaunchpad bug 1331452 in openssl098 (Ubuntu Utopic) "Please backport current CVEs for Precise LTS openssl098" [High,Fix released] https://launchpad.net/bugs/133145216:54
jdstrandYour work is very much appreciated and will keep Ubuntu users secure. Great job!16:54
jdstrand[TOPIC] Weekly stand-up report16:54
jdstrandI'll go first16:54
jdstrandI'm back from vacation so am catching up on what I missed16:55
jdstrandseems to be going ok so far16:55
jdstrandthank you for covering for me16:55
jdstrandI'm off Wednesday16:55
jdstrandI plan to do apparmor testing of jjohansen's abstract socket mediation patch set16:55
mdeslaurjdstrand: it was easy, I just did /nick jdstrand "I don't know." all week16:55
jdstrandhehe16:55
jdstrandI have an rtm work item I will be working on for click-apparmor16:56
jdstrandand I need to really get cracking on the performance reviews16:56
jdstrandmdeslaur: you're up16:56
mdeslaurI'm on triage this week16:56
mdeslaurI've got a few updates to test and release, including dbus16:56
mdeslaurand am currently working on php5 updates16:56
mdeslaurthe list is getting long, so that's what I'll be doing the rest of the week also16:57
mdeslaurthat's it for me! sbeattie, you're up16:57
sbeattieI'm also back from vacation and catching up on what I missed16:57
sbeattieI digging back into the gcc pie stuff16:57
mdeslaurah crud, I forgot about smb's xen updates last week...I'll be sponsoring that too16:58
sbeattieI need to sync up with jjohansen16:58
mdeslaursbeattie: hrm, please ask if jj has anything for you to help with before looking at gcc again16:58
sbeattiemdeslaur: heh, yeah, that's what I'm trying to say.16:59
mdeslaurcool16:59
sbeattiemdeslaur: but ack16:59
sbeattieanyway, that's pretty much it for me16:59
sbeattietyhicks: you're up16:59
tyhicksI'm currently fixing an eCryptfs kernel bug16:59
tyhicksit doesn't yet have an official bug, but it is mentioned in another bug: https://bugzilla.kernel.org/show_bug.cgi?id=41692#c217:00
ubottubugzilla.kernel.org bug 41692 in ecryptfs "Obscure improper EACCES with ecryptfs_xattr_metadata" [Normal,New]17:00
tyhicksI also plan to review a patch for an upcoming file encryption kernel feature17:01
tyhicksI need to rebase my dbus merge against the latest version debian testing17:01
tyhicksand then push it through17:02
tyhicksand then I'd like to take a look at my outstanding work items17:02
mdeslaurtyhicks: helping jj with whatever tasks he has to land the stuff for rtm has priority17:02
tyhicksI think "implement kernel postinst policy compiles" work item from last month would be a good one to start on17:02
jdstrandso, jjohansen said earlier that he would likely have some abstract patches17:02
tyhicksok17:02
jdstrandmdeslaur: perhaps tyhicks can help with the Ubuntu packaging/testing?17:03
tyhicksjjohansen: give me anything you'd like and I'll drop whatever I'm working on17:03
mdeslaurdefinitely17:03
tyhicksok17:03
jdstrandcool, yeah, let's have tyhicks take the lead on the Ubuntu landing.17:03
* tyhicks nods17:03
jdstrandtyhicks: I'll work with you on that like last time17:03
tyhicksok17:03
tyhicksthat's it for me17:04
tyhicksjjohansen: you're up17:04
jjohansenwell gee, I think its all been covered already :)17:04
jdstrandhehe17:04
jdstrandjjohansen: you are the man of the hour :)17:04
jjohansenI need to sync up with sbeattie, and jdstrand17:04
jjohansenI need to push out the abstract socket patches, I am currently doing some revisions on them17:05
tyhicksjjohansen: are you revising the kernel or userspace patches? (or both?)17:05
jjohansentyhicks: both17:05
tyhicksok17:05
tyhicksI'll watch the list for the userspace patches and then start packaging them up17:06
jjohansentyhicks: I'll start kicking stuff out today, I'll push the userspace first17:06
tyhickssounds good17:06
jdstrandjjohansen: will this include the backports for the touch kernels?17:07
jjohansenonce the abstract/anonymous socket mediation patches look good, I have to get some patches together to push upstream17:07
jjohansenjdstrand: uh sort of17:08
jdstrand?17:09
jjohansenjdstrand: its a set of changes on top of the current stuff. I expect we are going to just drop it as a diff on top of the current set. So now rebase etc is needed17:09
jdstrandok, that's sounds fine17:09
jjohansenI can certainly build touch kernels with the diff on top of the current17:09
jdstrandwe can't consider this landed until it is both userspace and the touch kernels17:10
jjohansenjdstrand: correct17:10
jdstrandso I just wanted to ask17:10
jdstrandjjohansen: for tyhicks and myself, we'll need generic amd64 (at least, perhaps i386), mako and goldfish17:10
jjohansenjdstrand: for landing there is some dependency ordering on policy17:10
jdstrandsure17:10
jjohansenright17:10
jdstrandlike last time17:10
jjohansenkernel is not dependent on userspace and userspace on kernel, so just policy17:11
jjohansenyep17:11
jdstrandso we don't have to hash that our all here. sounds like things are in order, we just need to execute17:11
* jdstrand is excited, but slightly worried about the policy changes17:11
jdstrandjjohansen: have you seen anything scary wrt policy changes?17:12
jjohansendefine scary :)17:12
mdeslaurscary as in "breaks everything"17:12
jdstrandI'm hoping it'll be a more or less non-event for upgraders (ie, we can tweak base and apparmor-easyprof-ubuntu accordingly)17:12
jdstrandI'm also hoping that we don't have bad required policy17:13
jjohansenuh yeah if rules aren't in place you can break things that are using abstract sockets17:13
jdstrandlike apps have to talk to the upstart abstract socket for some reason17:13
jjohansenthink just like with the unix socket fix that was done with saucy, without certain rules in place you fail to boot17:14
jdstrandjjohansen: right, I meant in your work, have you seen anything that was obvious that it couldn't be handled well by adjusting base, etc17:14
jdstrandor do we expect things to be similar to signal/ptrace mediation17:14
jdstrand(which went very well)17:15
jjohansenjdstrand: hrmmm, I haven't really thought about where the best place for the additions is, we certainly can add to base17:15
jjohansenyep17:15
jdstrandok, that's fine. just wondering if you had a feel for it yet. we certainly will once the patches go up :)17:15
* jdstrand is done with his questions17:16
jjohansenjdstrand: so my feel is we will stuff some of it in base. which is fine, its just a matter of tuning how tight you want things17:17
* jjohansen is done, sarnold you're up17:17
jdstrandcool, sounds great17:17
jdstrandwe'll discuss all that in #apparmor when the time is right17:17
* sarnold hides17:17
sarnoldI'm on community this week; I have a MIR for trust-store to work on, blueprint items to work on, and it sounds like jj's going to give me a giant gift-wrapped bow-tied balloon-festooned box of new patches to review! \o/17:18
mdeslaursarnold: are you still working with mterry on phone password handling?17:19
sarnoldmdeslaur: let me go reload that bug :)17:19
sarnolds/bug/merge request/17:19
mdeslaursarnold: I believe he had some follow up questions about how to handle empty passwords, etc, and I told him to work that out with you17:20
sarnoldmdeslaur: ah, looks like he's got wonderful answers to my questions, no new questions, looks like he's probably good :D17:20
sarnoldmdeslaur: ah right, and the securetty bits. i'm sorry I forgot about those.17:20
mdeslaursarnold: ping him when you get a chance and follow up to make sure all is resolved, please17:21
sarnoldmdeslaur: ack :)17:21
sarnoldI think that's me done, chrisccoulson?17:22
chrisccoulsonhi :)17:22
chrisccoulsonthis week, I'm looking at getting daily builds going for oxide (I did a hangout last week with oSoMoN and psivaa, and we decided to separate the CI and daily builds tasks, with me taking the latter)17:23
chrisccoulsonalso, will hopefully be testing and publishing a chromium update from chad :)17:23
mdeslaur\o/17:24
chrisccoulsonand, there'll be an oxide update too (with the new chromium release in)17:24
chrisccoulsonso, if you're using webapps in trusty, please do install the oxide build from https://launchpad.net/~ubuntu-mozilla-security/+archive/ppa/17:24
mdeslaursweet17:25
jdstrandchrisccoulson: re daily builds> oh nice :)17:26
chrisccoulsonalso, when I did our hangout last week, I did a little diagram explaining the release cycle: https://docs.google.com/a/canonical.com/presentation/d/1cJ_2nhHgv1A4tMUy4-7Tc1kt5r861a0CnYaG9GiOqIo/edit?usp=sharing17:26
jdstrandvery nice on oxide update for trusty too17:26
mdeslaurcool17:27
chrisccoulsonI'll put that in a blog post soon (the diagram is currently not publically shared, although there's no reason it shouldn't be)17:27
chrisccoulsonso the link won't work for anyone outside of canonical atm17:27
jdstrandcool17:27
chrisccoulsonI think that's me done17:28
jdstrandchrisccoulson: so, I think we need some sort of MRE like thing for oxide17:29
jdstrandhttps://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions17:29
sarnoldmeal ready to eat?17:29
sarnoldoh jeeze17:29
chrisccoulsonaha :)17:29
jdstrandchrisccoulson: perhaps mdeslaur can help there since he is on the TB17:30
jdstrandit is the plan of action, but it hasn't been ratified by the TB17:30
mdeslaursince there are security fixes included, no need for a mre17:30
mdeslaurif you ever want to publish new versions with only fixes, you need an mre17:31
jdstrandthis will have more than security updates aiui17:31
jdstrandjust like firefox and chromium-browser17:31
mdeslaurdoesn't matter, the mres are only for SRUs17:31
jdstrand(which have MREs)17:31
jdstrandok, fair enough17:31
jdstrandmakes it easier :)17:31
mdeslaurI mean, we still should probably ask for one, in case there are updates that don't include security fixes17:32
* jdstrand nods17:32
mdeslauronce we've done a couple via security updates, chrisccoulson can ask for the MRE17:33
jdstrandsounds like a plan17:33
jdstrand[TOPIC] Highlighted packages17:33
jdstrandhttp://people.canonical.com/~ubuntu-security/cve/pkg/redis.html17:34
jdstrandhttp://people.canonical.com/~ubuntu-security/cve/pkg/sup-mail.html17:34
jdstrandhttp://people.canonical.com/~ubuntu-security/cve/pkg/forked-daapd.html17:34
jdstrandhttp://people.canonical.com/~ubuntu-security/cve/pkg/syncevolution.html17:34
jdstrandhttp://people.canonical.com/~ubuntu-security/cve/pkg/libjboss-cache3-java.html17:34
jdstrandThe Ubuntu Security team will highlight some community-supported packages (^) that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so.17:34
jdstrandSee https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved.17:34
jdstrand[TOPIC] Miscellaneous and Questions17:34
jdstrandI only have one thing: if you have RTM work items, please work with mdeslaur on finding time to do them. we are rapidly approaching bug fixes only on the phone17:35
jdstrandotoh, I have one and then there is the abstract sockets17:36
jdstrand(mine is small and should be done this week)17:36
jdstrandif you aren't sure if it is for rtm, ask me and mdeslaur17:36
jdstrandDoes anyone have any other questions or items to discuss?17:36
=== vladk is now known as vladk|offline
jdstrand#endmeeting17:39
jdstrandmdeslaur, sbeattie, tyhicks, jjohansen, sarnold, ChrisCoulson: thanks!17:39
sarnoldthanks jdstrand :)17:39
tyhicksthanks!17:40
mdeslaurthanks jdstrand!17:40
jjohansenthanks jdstrand17:40
jdstrandwhere is meeting bot?17:40
* jdstrand shrugs17:40
mdeslaurjdstrand: it's a national bot holiday today17:41
jdstrandhehe17:41
mdeslaureither that, or world cup17:41
sbeattieheh17:42
sbeattiethanks jdstrand17:42
=== vladk|offline is now known as vladk
=== vladk is now known as vladk|offline
=== vladk|offline is now known as vladk
=== vladk is now known as vladk|offline
=== vladk|offline is now known as vladk
=== vladk is now known as vladk|offline
=== Ursinha is now known as Ursinha-afk

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!