The ASF generally mandates a min of 3 days for votes on release
candidates. This can be significantly shortened if there is a security
issue that needs a quick release.
With Podlings, they typically require 2 rounds of voting (PPMC and
then the Incubator PMC) but again if a podling needs a quick release
they can forewarn the PPMC and Incubator PMC about the need for a
curtailed voting schedule.

In my experience, fixes for Zero Day exploits are only a small
proportion of the security related fixes that get made.

This is somewhat tangential to what this discussion is about.

On Fri, 24 Jan 2025 at 22:34, Jochen Theodorou
<blackd...@gmx.org.invalid> wrote:
>
> Maybe one more thing we should think about. What if there is a security
> issue, the response of the podling is good and the issue gets fixed very
> fast. And can only be fixed by a new release. But then the incubator
> finds issues with the release and the release issues cannot be fixed
> right away. I doubt the security process describes this kind of scenario.
>
>
> On 24.01.25 17:32, PJ Fanning wrote:
> > Thanks Calvin for your response. Maybe we could start by having the ASF
> > Security team track progress on reported issues - as they already do. In
> > the Incubator public reporting, we would not disclose anything other than
> > self reporting that the PPMC feels confident that they are in a good
> > position to deal with issues and follow the ASF Security process.
> >
> > Maybe the Incubator shepherds could independently check this too.
> >
> > I'm open to forming a consensus on the right level of reporting.
> >
> > When it comes to graduating, I would like to be able to vote -1 for
> > podlings who appear not to be following the security process.
> >
> >
> >
> > On Fri 24 Jan 2025, 16:11 Calvin Kirs, <k...@apache.org> wrote:
> >
> >> I completely agree with this proposal, even though some podlings rarely
> >> encounter security issues during incubation. (This may change as they
> >> transition to TLP status and gain more visibility.) However, understanding
> >> and recognizing the importance of security issues is also something
> >> podlings need to learn during the incubation period.
> >>
> >> If podlings are required to report existing security issues and their
> >> progress, how should this be done? Through private@i.a.o? Currently, our
> >> reports are fully public.
> >>
> >> In the final board submission, the Incubator will also need to provide a
> >> consolidated private report on security issues. This report should include
> >> the number of security issues and identify any podlings that are in an
> >> unhealthy state regarding their handling of security problems.
> >>
> >> That said,  the successful submission of this report will likely rely
> >> heavily on the efforts of shepherds and mentors.
> >>
> >> On Fri, Jan 24, 2025 at 9:36 PM PJ Fanning <fannin...@gmail.com> wrote:
> >>
> >>> Hi everyone,
> >>>
> >>> I didn't follow up on this when I raised it in December 2023. I'd like
> >>> to propose it again.
> >>> Basically, the idea is that the podling reports, that we do every 3
> >>> months, would have a question about whether the podling believes that
> >>> they are being sufficiently responsive to issues raised on their
> >>> private mailing list (particularly security issues). There would maybe
> >>> also be a reminder about the ASF policies related to dealing with
> >>> disclosures about vulnerabilities [1].
> >>> I would also like to see a section about this in the Graduation Report
> >>> - having podlings declare that they have been and intend to continue
> >>> to be responsive to disclosures about vulnerabilities. This is covered
> >>> by QU30 in the Project Maturity Model [2] but I wonder if the text
> >>> could be adjusted to also mention the need to be responsive to
> >>> vulnerability reports.
> >>> With efforts like the CRA [3] and other regulatory requirements around
> >>> the world, this area is becoming even more important.
> >>>
> >>> What do people think?
> >>>
> >>> Thanks,
> >>> PJ
> >>>
> >>> [1] https://www.apache.org/security/
> >>> [2]
> >>>
> >> https://community.apache.org/apache-way/apache-project-maturity-model.html#quality
> >>> [3] https://en.wikipedia.org/wiki/Cyber_Resilience_Act
> >>>
> >>> On Wed, 13 Dec 2023 at 16:21, Craig Russell <apache....@gmail.com>
> >> wrote:
> >>>>
> >>>> Hi PJ,
> >>>>
> >>>> I agree that there should be a section in podlings' reports that
> >>> highlights <private/> security issues.
> >>>>
> >>>> Regards,
> >>>> Craig
> >>>>
> >>>>> On Dec 13, 2023, at 05:22, PJ Fanning <fannin...@apache.org> wrote:
> >>>>>
> >>>>> Hi everyone,
> >>>>>
> >>>>> I'm wondering if podlings should include some details about their
> >>>>> security issues [1] in their 3 podling reports. We won't want to
> >>>>> release information about any security issues that are still under
> >>>>> investigation or where the fix is not yet released. I still think
> >>>>> there is little harm in podlings giving high level numbers and maybe
> >>>>> some indication of how quickly security issues are being dealt with.
> >>>>>
> >>>>> I've seen evidence that some TLPs are unaware of the importance of
> >>>>> dealing quickly with security reports and I think the Incubator team
> >>>>> could help with ensuring that podlings are aware of the requirements.
> >>>>>
> >>>>> I will certainly be having a close look at a podling's record of
> >>>>> handling security reports when it comes to discussions about
> >>>>> graduation.
> >>>>>
> >>>>> I'm wondering if we could have some consensus on what is expected of
> >>> podlings.
> >>>>>
> >>>>> Regards,
> >>>>> PJ
> >>>>>
> >>>>> [1] https://www.apache.org/security/
> >>>>>
> >>>>> ---------------------------------------------------------------------
> >>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>>>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>>>
> >>>>
> >>>> Craig L Russell
> >>>> c...@apache.org
> >>>>
> >>>>
> >>>> ---------------------------------------------------------------------
> >>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>>
> >>>
> >>> ---------------------------------------------------------------------
> >>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>
> >>>
> >>
> >> --
> >> Best wishes!
> >> CalvinKirs
> >>
> >
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
>

---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to