Minutes 2024-01-06
Minutes 2024-01-06
Meeting was on Saturday January 6th, 2024, at 12:00 UTC.
Attendees & regrets
- Present: @stigtsp, @petek, @sjn, @timlegge
- Regrets: @leont, @tux, @jjatria, @oalders
Quick summary of current work
- CPAN Metadata & Software Bills of Materials
- @sjn - CPAN Supply-chain overview ongoing
- @sjn - PackageURL discussion ongoing
- CPAN Transparency Logs
- @stigtsp – CPAN snapshots & checksums prototype ongoing
- CPAN Provenance & Supply Chain Security
- @stigtsp – Propose cpanm default to https
- CPAN Rich Metadata & Dependencies
- @sjn – Outreach to #debian-perl (WIP)
- CPAN Software Composition Analysis
- No activity
- CPANSec Governance, Policy & Funding
- @sjn – Charter
- Ongoing work
- @stigsp – Pre-Release Disclosure
- Out of draft
- Privacy concerns around signing; To be discussed
- Signing needs to be in sync with mailing list members (sync with perl-noc). @stigtsp looks into this.
- Sign using a github commit.
- @petek – TPRF and funding procedures
- Small grants go via TPRF board. Meetings during the 3rd week of each month.
- Large grants; TPRF can manage the funds. Earmarked funds will be handled by the TPRF treasurer. The Dancer project has a relevant charter (@petek will share).
- @sjn – Charter
- CPAN Privacy and Compliance
- No activity
- CPAN Vulnerability Index
- @stigtsp
- bdfoy (CPAN::Audit author) has been invited to join us, unclear response.
- Goal: create a website like security.archlinux.org. Work not begun.
- @stigtsp
- CPAN Security Patch Tooling
- No activity
- CPAN Security Outreach & Information
- @sjn – Proposal: “2024 – The CPAN year of «Secure by Default»”
- 4 votes Aye, 0 votes Nay. We’ll proceed with an announcement.
- @petek & @sjn meet for text writing the coming week. @petek finds a suitable time to do this.
- @sjn – Proposal: “2024 – The CPAN year of «Secure by Default»”
Vulnerabilities
- Spreadsheet::ParseExcel – CVE-2023-7101
- Old known bug, high criticality, root cause of CVE-2023-7102
- Responsive developer, produced a fix quickly
- @timlegge & @stigtsp to write a post-mortem blog post
- Spreadsheet::ParseXLSX – DoS/Memory bug
- CVE id incoming
- New maintainer for Spreadsheet::ParseXLSX found. Yay!
- @timlegge: “PAUSE Operating Model’s Takeover process is slow” – the reasons are understood from an ownership and community perspective, but it does present issue for timely resolution of security issues.
- One more undisclosed vuln, through the VINCE portal
- Info forthcoming depending on analysis
Operating changes
- Set up an end-to-end secure channel for discussing vulnerabilities
- @stigtsp – We decide with a straw poll on IRC
- Matrix channel set up, contact @stigtsp for invites
- Signal channel set up, contact @stigtsp for invites
- Invitiation requires signing the Pre Release Disclosure Agreement
- @stigtsp – We decide with a straw poll on IRC
- Interaction with other related communities; and formalizing these relationships
- @timlegge – VINCE Portal access granted.
- @timlegge has been granted admin access, contact him for invites
- Invitiation requires signing the Pre Release Disclosure Agreement
- @timlegge – VINCE Portal access granted.
Events and deadlines
- FOSDEM, 2023-02-03 - 2023-02-04
- Attendees we know of: @stigtsp, @sjn
- PTS 2024 is TBA
- German Tech Sovereignity Fund application deadline is TBA (“Spring 2024”)
Next meeting organizer & deputy
- @sjn; deputy is @stigtsp