Hello everyone!
I am requesting membership to ~ubuntu-security. The information requested in the spec is listed below:
Team Memberships
I am currently a member of the following teams:
Ubuntu Security Apprentices - Joined on 2024-04-30
Canonical Security Team - Joined on 2023-10-18
Canonical - Joined on 2023-10-16
Verified Identity
My identity was verified through the general Canonical employee onboarding process, which includes a background check, and verification of my government issued identity documentation.
I have also attended the Canonical Engineering Sprint in May 2024, where during a PGP key signing party, several members of the Ubuntu Security team were able to verify my identity.
I have attended the Canonical Engineering Sprint in October 2023, where I met most of the team in person.
My PGP signed “Ubuntu Codes of Conduct” is attached to my Launchpad account, and available here
History of high-quality sponsored security updates
While being at Canonical I have taken part in the PSIRT initiative - working on validating vulnerability reports, crafting PoCs and publishing patches
CUPS
- USN-6844-1 - CUPS vulnerability - part of a chain, worked on validating and backporting the patch, upstream fixes lead to regression leading to
- USN-6844-2 - some public feedback and personal chats later
netplan.io
- USN-6851-1 - internal report - part of another chain, worked on testing and backporting, upstream fixes lead to another regression (you see a pattern here!)
- USN-6851-2
wpa
- USN-6945-1 - part of the chain from earlier USNs - tested and working on Marc’s patch
Demonstrated understanding of required tools and systems
I have worked with UCT as a part of my CVE patching process, example merge requests are listed below:
For UST
467150
I have undertaken MIRs and related upstream contributions
sysprof and related PR fixes
python-boto3, python-botocore, python-s3transfer and related PR fix
authd
PR/Patch review - might 403 - private vuln reports
netplan.io
cloud-init
While working on patches - upstream fixes
python-versioneer
Demonstrated responsive and respectful communication
I have signed the code of conduct. I regularly monitor Launchpad bugs for packages I have patched, as well as relevant mailing list announcements, looking for possible regressions.
This can be verified by the regression chain for cups linuxmint-forum and related lp
Demonstrated understanding of the responsibility of ~ubuntu-security membership
I am following credentials best practices, my disk is fully encrypted, and have 2FA enabled for all accounts.