Security Team Weekly Summary, 2009-09-28
Robbie Williamson
robbie at ubuntu.com
Mon Sep 28 22:44:07 BST 2009
=== Jamie Strandboge ===
Role: community
== Issue Tracking ==
* bug triage
* CVE traige
== Updates ==
* publish postgresql
* asterisk sponsored upload and testing for iamfuzz
* dovecot and newt sponsored uploads for mdeslaur
== Technology Development ==
* AppArmor
* firefox
* fix LP: #433128 (Apparmor denies firefox extension execution)
* fix LP: #433362 (Apparmor blocks access to /media in Firefox)
* fix LP: #436221 (apparmor profile is not disabled on upgrade from
jaunty firefox-3.5)
* firefox merge discussion
* libvirt
* implement XML parsing in security driver along with other upstream
suggestions
* test cases for attach/detach-disk/device
* investigate spurious apparmor denied messages which occasionally
occur on attach (only occurs during guest boot when acpi is being
loaded and perform the attach at that instant)
* resubmit libvirt patch to upstream
* QRT: write libvirt-apparmor.sh
* follow up on LP: #400682 ([Karmic stac9227 regression] No sound after
upgrade from Jaunty to Karmic)
* brainstorm group functionality for ufw. Basic idea is that ufw can
essentially be a wrapper around ip[6]tables so most applications that
just add rules to the BUILTIN chains can more easily add ufw support.
This is all very hand-wavy, but the user experience might be
something like:
* application calls 'ufw -g eucalyptus -A INPUT ...iptables rule...',
which creates a 'eucalyptus-INPUT' chain, and adds the rule to this
chain (note that the various BUILTIN chains would need to be
supported)
* administrator can then reference <group> when manipulating rulesets,
eg
'sudo ufw group in eucalyptus'. This rule will add '-j
eucalyptus-INPUT'
rule into the user chain
== Community ==
* participate in security team meeting
* comment on core-dev application for nxvl
* prepare for/participate in release meeting
* write https://wiki.ubuntu.com/SecurityTeam/ReleaseStatus
=== Kees Cook ===
Weekly Role: community
== Updates ==
* published neon updates (USN-835-1)
== Technology Development ==
* backported AppArmor parser to jaunty kernel interface.
== Technology Integration ==
* discussing apparmor loading with Keybuk.
* writing initramfs hooks for apparmor.
* removing executable stack from mountall (LP: #434813).
* implemented --password in gnome-about-me (LP: #307019).
== Auditing ==
* embargoed issue investigation.
== Community ==
* attended LinuxCon, Linux Plumber's Conference.
* investigating SELinux state in Karmic, talked with Caleb Case.
* discussed upstreaming NX-emulation with Dave Jones.
* reviewed/uploaded ufw for jdstrand.
=== Marc Deslauriers ===
Weekly role: triage
== Issue Tracking ==
* CVE triage
* security bug triage
== Updates ==
* Worked on, tested and released USN-836-1: WebKit vulnerabilities
* Worked on, tested and released USN-837-1: Newt vulnerability
* Researched php5 CVEs
* Researched and worked on dovecot CVEs
== Technology development ==
* ubuntu-security-tools:
- scripts/cve_lib.py: don't die on a blank line
* Opened upstream bug for "vino-preferences does not report public IPv6
addresses" (LP: #344489)
* qa-regression-testing:
- Added to test-dovecot.py testing script
--
Robbie Williamson <robbie at ubuntu.com>
Ubuntu
More information about the ubuntu-devel
mailing list