Skip to Main Content
Apache Events The Apache Software Foundation
Apache 20th Anniversary Logo

This was extracted (@ 2024-04-17 21:10) from a list of minutes which have been approved by the Board.
Please Note The Board typically approves the minutes of the previous meeting at the beginning of every Board meeting; therefore, the list below does not normally contain details from the minutes of the most recent Board meeting.

WARNING: these pages may omit some original contents of the minutes.
This is due to changes in the layout of the source minutes over the years. Fixes are being worked on.

Meeting times vary, the exact schedule is available to ASF Members and Officers, search for "calendar" in the Foundation's private index page (svn:foundation/private-index.html).

Security Team

20 Mar 2024 [Mark J. Cox / Willem]

- Apache Archiva retired to the Attic with a number of open security
 reports. We took care of publishing advisories for those.

- Apache Ambari has published advisories for all issues that were
 previously briefly prematurely disclosed by a third party. We're
 still planning a retrospective to ensure the communication
 expectations are understood.

- We looked into the Cc/Reply-to issue that is causing issues with
 emails not being delivered to GMail mailboxes, which also affects
 security reports.

- We reviewed the preliminary report of the OSTIF audit of several
 Apache Commons components and provided feedback.

- We worked with the Santuario project to improve the messaging around
 the XML Security for C++ project.

- We provided input to Infra on how to improve the security and
 privacy of Apache project websites by applying an Apache-wide
 default Content-Security-Policy header (INFRA-25518).

Stats for Feb 2024:

       46      [license confusion]
       14      [support request/question not security notification]
       10      [report/question relating to dependencies]

Security reports: 78 (last months: 86, 70, 74, 76)

       11      ['airflow']
       5       ['dolphinscheduler']
       4       ['tomcat']
       4       ['website or other infrastructure']
       3       ['pulsar', 'spark', 'superset']
       2       ['cloudstack', 'commons', 'db', 'guacamole', 'linkis',
               'trafficserver', 'tvm' ]
       1       ['answer', 'apisix', 'apr', 'arrow', 'aurora', 'beam',
               'camel', 'datafu', 'dubbo', 'flex', 'flink', 'groovy',
               'httpd', 'ibb', 'kafka', 'lucene', 'lucenenet',
               'mahout', 'mesos', 'mxnet', 'parquet', 'qpid',
               'shenyu', 'servicecomb', 'storm', 'streampipes',
               'submarine', 'tribes', 'velocity', 'wicket',
               'zeppelin']

    In total, as of 1st March 2024, we're tracking 173 (last
    months: 199, 175) open issues across 67 projects, median age 82
    days (last months: 90, 119). 61 of those issues have CVE names
    assigned.

    23 (last month: 28) of these issues, across 8 projects, are older
    than 365 days.

21 Feb 2024 [Mark J. Cox / Willem]

- Deployments that are vulnerable because they did not change the default
 keys in Apache Superset appear to be actively exploited. The project has
 removed the default keys from recent versions, and published CVE-2023-27524
 for this issue, which was included in the CISA Known Exploited
 Vulnerabilities (KEV) database.

- We have integrated the experimental Apache OIDC 2FA provider to give access
 to our experimental SBOM platform to all Apache volunteers.

- We provided input for a number of press pieces on OFBiz issue
 CVE-2023-51467

- We worked with Google to improve access to Commons oss-fuzz results

Stats for Jan 2024:

       30	[license confusion]
       19	[support request/question not security notification]]
       12	[report/question relating to dependencies]

Security reports: 86 (last months: 70, 74, 76)

       13	['airflow']
       7	['website or other infrastructure']
       5	['superset']
       4	['commons', 'dolphinscheduler', 'tomcat']
       3	['answer', 'inlong', 'maven']
       2	['ambari', 'camel', 'dubbo', 'fineract', 'hive', 'httpd', 'nifi', 'ofbiz', 'zeppelin']
       1       ['brpc', 'cisa', 'cocoon', 'druid', 'flink', 'groovy', 'hc', 'hop',
               'ignite', 'iotdb', 'kafka', 'kudu', 'mynewt', 'openjpa', 'pdfbox',
               'roller', 'santuario', 'seata', 'servicecomb', 'sling',
               'streampipes', 'struts']

    In total, as of 1st February 2024, we're tracking 199 (last
    months: 175, 180) open issues across 64 projects, median age 90
    days (last months: 119, 122). 73 of those issues have CVE names
    assigned.

    27 (last month: 29) of these issues, across 9 projects, are older
    than 365 days.

17 Jan 2024 [Mark J. Cox / Bertrand]

- The Tomcat project has been onboarded in the HackerOne Internet Bug
 Bounty (IBB) program, meaning reporters who are credited in Tomcat
 CVEs can now claim a bug bounty from that program.

- Struts published a fix for a critical vulnerability, CVE-2023-50164
 (S2-066) which attracted some attention online.

- OFBiz published a fix for a critical vulnerability CVE-2023-49070
 and update CVE-2023-51467 which is being exploited
 https://www.bleepingcomputer.com/news/security/apache-ofbiz-rce-flaw-exploited-to-find-vulnerable-confluence-servers/

Stats for Dec 2023:

       30      [license confusion]
       16      [support request/question not security notification]]
       10      [report/question relating to dependencies]

   Security reports: 70 (last months: 74, 76, 66)

       12      ['airflow']
       9       ['website or other infrastructure']
       5       ['ofbiz']
       4       ['httpd']
       3       ['hugegraph', 'superset', 'tomcat']
       2       ['james', 'streampark', 'struts']
       1       ['answer', 'camel', 'cassandra', 'commons', 'flink',
               'geode', 'guacamole', 'helix', 'hive', 'hop', 'inlong',
               'kylin', 'linkis', 'openjpa', 'openoffice', 'seata', 'shiro',
               'sling', 'solr', 'streampipes', 'submarine', 'whimsy',
               'zeppelin']

    In total, as of 1st January 2024, we're tracking 175 (last
    months: 180, 183) open issues across 61 projects, median age 119
    days (last months: 122, 116). 56 of those issues have CVE names
    assigned.

    29 (last month: 22) of these issues, across 11 projects, are older
    than 365 days.

The board trusts the security team to follow through on the plan in place for Zeppelin.

20 Dec 2023 [Mark J. Cox / Bertrand]

- A fix for a serious issue in ActiveMQ (CVE-2023-46604) has been
 released, but unfortunately it seems installations that have not
 been upgraded are actively exploited. The issue has been added to
 the CISA Known Exploited Vulnerabilities (KEV) Catalog.

- Based on input from various parts of the ASF, we have formulated a
 response to the White House Office of the National Cyber Director
 (ONCD) Request for Information (RFI) on "Open-Source Software
 Security and Memory Safe Programming
 Languages". https://www.regulations.gov/comment/ONCD-2023-0002-0106

- We have worked closely with DolphinScheduler to get back to security
 health.  While there is still significant work to do, the project
 has been active and we are confident they will turn things around.

- We have worked with the Logging team supporting their efforts around
 reproducibile builds and providing SBOM/VEX/VDR information.

- We have set up and experimental platform to collect and aggregate
 SBOMs and information about advisories for 3rd-party
 dependencies. This is already populated with information from 257
 artifacts across 13 Apache projects, which we plan to expand and use
 to get more actionable information.

Stats for Nov 2023:

       34      [license confusion]
       24      [report/question relating to dependencies]
       15      [support request/question not security notification]]

   Security reports: 74 (last months: 76, 66, 65)

       17      ['website or other infrastructure']
       8       ['airflow']
       3       ['apr', 'arrow'']
       2       ['doris', 'drill', 'guacamole', 'httpd', 'mxnet', 'nifi',
               'struts', 'superset', 'vince', 'zeppelin']
       1       ['answer', 'beam', 'cloudstack', 'commons', 'flink',
               'gobblin', 'hive', 'iceberg', 'james', 'kylin', 'logging',
               'mina', 'ofbiz', 'openoffice', 'poi', 'ranger', 'shiro',
               'spark', 'streampark', 'tiles', 'tvm', 'wicket',
               'zookeeper']

    In total, as of 1st December 2023, we're tracking 180 (last
    months: 183, 172) open issues across 59 projects, median age 122
    days (last months: 116, 104). 52 of those issues have CVE names
    assigned.

    22 (last month: 20) of these issues, across 8 projects, are older
    than 365 days.

15 Nov 2023

Update Apache Security Team Membership

 WHEREAS, the Apache Software Foundation (ASF) Board Commmittee,
 known as the Apache Security Team expects to better serve
 its purpose through the periodic update of its membership; and

 WHEREAS, the Apache Security Team is a Board-appointed committee
 whose membership must be approved by Board resolution;

 NOW, THEREFORE, BE IT RESOLVED, that the following ASF
 members be added as Apache Security Team members:

 Jarek Potiuk <potiuk@apache.org>
 Henri Yandell <bayard@apache.org>

 Special Order 7C, Update Apache Security Team Membership, was
 approved by Unanimous Vote of the directors present.

15 Nov 2023 [Mark J. Cox / Bertrand]

- A recently fixed and published vulnerability in Apache ActiveMQ,
 CVE-2023-46604, has been getting some press attention due to it
 being exploited including by ransomware.  It has been added to the
 CISA Known Exploited Vulnerabilities list.

- We participated in Community over Code NA, among other conversations
 sharing the learnings from the formation of the Airflow security
 team.

Stats for Oct 2023:

       36      [license confusion]
       12      [report/question relating to dependencies]
       9       [support request/question not security notification]]

       Security reports: 76 (last months: 66, 65, 88)

       15      ['airflow']
       14      ['website or other infrastructure']
       4       ['httpd']
       3       ['seatunnel', 'trafficserver']
       2       ['ambari', 'commons', 'inlong', 'jspwiki', 'linkis',
               'openoffice', 'shiro', 'superset']
       1       ['activemq', 'allura', 'apisix', 'avro', 'axis', 'brpc',
               'camel', 'doris', 'dubbo', 'flink', 'guacamole', 'hive',
               'infra', 'iotdb', 'kafka', 'logging', 'oozie', 'solr',
               'spark', 'tomcat', 'zookeeper']

    In total, as of 1st November 2023, we're tracking 183 (last
    months: 172, 181) open issues across 56 projects, median age 116
    days (last months: 104, 108). 50 of those issues have CVE names
    assigned.

    20 (last month: 14) of these issues, across 8 projects, are older
    than 365 days.

@Bertrand: follow up with security team about zeppelin roll call

18 Oct 2023 [Mark J. Cox / Bertrand]

- Some time ago Santuario worked with Zoho to diagnose an issue that
 turned out to be incorrect use of an outdated xmlsec (Apache
 Santuario) by Zoho.  Zoho fixed their software and disclosed
 CVE-2022-47966 for it. Unfortunately one of their on-prem customers
 had not upgraded and was compromised. This was published as a CISA
 CSA at https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a
 This was picked up by some news outlets, but no wide coverage.

- CISA has added Apache RocketMQ vulnerability CVE-2023-33246 to their
 Known Exploited Vulnerabilities (KEV) catalog.

- The HackerOne Internet Bug Bounty (IBB) programme have indicated
 they are interested in onboarding additional Apache projects. We
 are working with them on this.

Stats for Sept 2023:

       58      [license confusion]
       12      [report/question relating to dependencies]
       11      [support request/question not security notification]]

       Security reports: 66 (last months: 65, 88, 73)

       15      ['website or other infrastructure']
       14      ['airflow']
       6       ['tomcat']
       2       ['cxf', 'dubbo', 'fineract', 'httpd', 'ibb', 'ignite']

       1       ['archiva', 'beam', 'commons', 'cwe', 'druid', 'geode',
               'guacamole', 'hive', 'hop', 'kafka', 'linkis',
               'mxnet', 'ofbiz', 'openoffice', 'pdfbox', 'santuario',
               'stf', 'storm', 'zookeeper']

    In total, as of 2nd October 2023, we're tracking 172 (last
    months: 181, 171) open issues across 52 projects, median age 104
    days (last months: 108, 106). 52 of those issues have CVE names
    assigned.

    14 (last month: 13) of these issues, across 7 projects, are older
    than 365 days.

20 Sep 2023 [Mark J. Cox / Sander]

* CISA released their '2022 Top Routinely Exploited Vulnerabilities'
 report, mentioning "malicous cyber actors continued to show high
 interest in CVE-2021-44228 through the first half of
 2022". (Log4Shell).  The 'Additional Routinely Exploited
 Vulnerabilities' table also lists some HTTP Server vulnerabilities
 and a follow-up on Log4Shell:
 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a

* Nucleus Security made a visual representation of vendors in CISA's
 Known Exploited Vulnerabilities report. With 28 of the 989
 vulnerabilities, Apache is visible on the chart:
 https://nucleussec.com/cisa-kev-art/

Stats for Aug 2023:

  25      [license confusion]
  20      [support request/question not security notification]]
  8       [report/question relating to dependencies]

  Security reports: 65 (last months: 88, 73, 59, 73)

  11      ['airflow', 'website or other infrastructure']
  3       ['tomcat']

  2       ['beam', 'commons', 'dolphinscheduler', 'hive', 'hop',
          'kafka', 'linkis', 'nifi', 'pulsar', 'seatunnel', 'shiro',
          'superset']
  1       ['ant', 'couchdb', 'druid', 'dubbo', 'fineract', 'geode',
          'groovy', 'hadoop', 'httpd', 'inlong', 'openoffice', 'pinot',
          'ranger', 'spark', 'struts', 'trafficserver']

    In total, as of 1st September 2023, we're tracking 181 (last
    months: 171, 170) open issues across 54 projects, median age 108
    days (last months: 106, 104). 46 of those issues have CVE names
    assigned.

    13 (last month: 12) of these issues, across 7 projects, are older
    than 365 days.

@Bertrand: follow up with Mark about Zeppelin

16 Aug 2023 [Mark J. Cox / Willem]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

- in the news: OpenMeetings vulnerabilities
 https://thehackernews.com/2023/07/apache-openmeetings-web-conferencing.html

Stats for Jul 2023:

       32      [license confusion]
       9       [support request/question not security notification]
       9       [report/question relating to dependencies]

       Security reports: 88 (last months: 73, 59, 73)

       34      ['website or other infrastructure']
       6       ['rocketmq', 'superset']
       4       ['doris']
       3       ['apisix', 'inlong', 'openoffice']
       2       ['airflow', 'dolphinscheduler', 'guacamole', 'ignite', 'tomcat']
       1       ['ambari', 'avro', 'axis', 'commons', 'felix', 'flink', 'geode',
               'helix', 'hive', 'johnzon', 'logging', 'pulsar', 'semgrep',
               'solr', 'struts', 'tika', 'trafficserver', 'uima', 'zookeeper']

    In total, as of 1st August 2023, we're tracking 171 (last months:
    170, 165) open issues across 52 projects, median age 106 days
    (last months: 104, 76). 40 of those issues have CVE names
    assigned.

    12 (last month: 11) of these issues, across 6 projects, are
    older than 365 days.

@Sander: work with Brian around messaging this out

19 Jul 2023 [Mark J. Cox / Bertrand]

- We have engaged with the Trivy SBOM/security scanner project to
 discuss how we can help reduce noise and make security reports more
 accurate, possibly using VEX. This is challenging because it
 requires the scanner to have access to not just a list, but the
 graph of dependencies.

- The Airflow project are working on publishing SBOM information with
 their binary artifacts.

- We helped publish https://apache.org/.well-known/security.txt

Stats for June 2023:

       46      [license confusion]
       22      [support request/question not security notification]
       9       [report/question relating to dependencies]

       Security reports: 73 (last months: 59, 73, 64)

       18      ['website or other infrastructure']
       5       ['tomcat']
       4       ['airflow']
       3       ['httpd', 'openoffice']
       2       ['activemq', 'hadoop', 'nifi', 'superset', 'trafficserver', 'xalan']

       1       ['accumulo', 'apisix', 'aries', 'baremaps', 'camel',
               'carbondata', 'cloudstack', 'cordova', 'doris',
               'felix', 'guacamole', 'iotdb', 'jackrabbit', 'jena',
               'jspwiki', 'myfaces', 'netbeans', 'openmeetings',
               'ozone', 'pekko', 'pig', 'pinot', 'rocketmq',
               'roller', 'sling', 'storm', 'xerces', 'zeppelin']

In total, as of 3 July 2023, we're tracking 170 (last months: 165,
173) open issues across 57 projects, median age 104 days (last months:
76, 69). 54 of those issues have CVE names assigned.

    11 (last month: 12) of these issues, across 5 projects, are
    older than 365 days.

@Bertrand: keep an eye on Zeppelin's progress in security fixes

@Willem: also follow up on Zeppelin security

21 Jun 2023 [Mark J. Cox / Rich]

- An older Tomcat JMX issue, CVE-2016-8735, was selected to be included in the
 CISA Known Exploited Vulnerabilities (KEV) catalog.

- We have engaged with the Trivy SBOM/security scanner project to discuss how
 we can help reduce noise and make security reports more accurate, possibly
 using VEX. This is challenging because it requires the scanner to build not
 just a list, but the graph of dependencies.

- We are working with NIST/NVD to improve the consistency of CPE's, and have
 stopped distinguishing between 'incubating' and 'regular' Apache projects in
 the CPE, to avoid missing associations.

- The Airflow project has formed a security@airflow.apache.org group, which
 hopefully will help clear their considerable backlog.

- We continue working with projects to publish 'security model' information on
 their websites, this month PDFBox.

- We have started exploring creating a single place to find security contact
 information and advisories for all Apache projects on
 https://security.apache.org and also moved our blog there

Stats for May 2023:

       22 [license confusion]
       11 [support request/question not security notification]]
       2 [report/question relating to dependencies]

Security reports: 59 (last months: 73, 64, 71)

       8 ['superset']
       6 ['vince', 'website or other infrastructure']
       4 ['rocketmq']
       3 ['airflow', 'inlong', 'tomcat']
       2 ['commons', 'dolphinscheduler']
       1 ['activemq', 'apisix', 'atlas', 'codeql', 'cpe',
       'fedramp', 'flink', 'hadoop', 'hive', 'ibb', 'ignite', 'infra',
       'nifi', 'openoffice', 'poi', 'ranger', 'shiro', 'solr', 'spark',
       'storm', 'streampark', 'trafficserver']

    In total, as of 1 June 2023, we're tracking 165 (last months: 173, 153)
    open issues across 56 projects, median age 76 days
    (last months: 69, 78). 46 of those issues have CVE names assigned.

    12 (last month: 7) of these issues, across 6 projects, are older than 365
    days.

@Bertrand: Follow up with Zeppelin roll call

17 May 2023 [Mark J. Cox / Rich]

- We have have started providing guidance for consistent software
 identification using schemes such as Purl and SWIG, so vulnerability
 information can more easily be shared by Apache itself as well as
 third parties. Such consistent naming is essential to improve the
 accuracy of SBOM and vulnerability scanning activities.

- We identified a PyPI package that was still managed outside of
 Apache and was missing security updates.

- We are working with projects to publish 'security model' information
 on their websites, which help users understand what to expect from
 the project security-wise and security researchers on where to best
 focus their efforts.  In April such a section was published for
 Apache Commons.

- We are working with the Airflow project to form a
 security@airflow.apache.org group.

- We moved our blog to the newly-created https://security.apache.org

Stats for April 2023:

       29	[license confusion]
       21	[support request/question not security notification]
       4	[report/question relating to dependencies]

Security reports: 73 (last months: 64, 71, 47)

       11	['airflow']
       9	['inlong']
       7	['superset']
       6	['website or other infrastructure']
       4	['dolphinscheduler']
       2	['apisix', 'commons', 'dubbo', 'httpd', 'pulsar', 'streampark', 'trafficserver']
       1	['lineaje', 'allura', 'brpc', 'doris', 'druid', 'fineract', 'guacamole', 'jackrabbit', 'jena', 'johnzon', 'linkis', 'logging', 'mxnet', 'netbeans', 'ofbiz', 'pinot', 'shenyu', 'streampipes', 'struts', 'tomcat', 'tvm', 'xerces']

    In total, as of 1 May 2023, we're tracking 173 (last months: 153,
    154) open issues across 62 projects, median age 69 days (last
    months: 78, 91). 65 of those issues have CVE names assigned.

    7 (last month: 8) of these issues, across 5 projects, are older
    than 365 days.

19 Apr 2023 [Mark J. Cox / Craig]

- We continue to work to improve the accuracy of our disclosed
 vulnerabilities by: working with NIST's NVD programme to align their
 CWE classifications, reviewing and suggesting fixes to the CPE's
 that were assigned to our CVE's by NIST's NVD programme, and
 reviewing the artifact mappings assigned to them in the GitHub
 Security Advisory (GHSA) database, and adding missing ones.

- We worked with the infrastructure, marketing & publicity and data
 privacy teams to improve some security/privacy features on
 www.apache.org

- CVE-2022-33891 (in Spark) will be added to the "CISA Known Exploited
 Vulnerabilities (KEV) catalog".

Stats for March 2023:

       43 [license confusion]
       15 [support request/question not security notification]
       7 [report/question relating to dependencies]

Security reports: 64 (last months: 71, 59, 62 )

       9 ['airflow']
       8 ['website or other infrastructure']
       4 ['dubbo', 'linkis', 'tomcat']
       3 ['pulsar']
       2 ['archiva', 'commons', 'inlong', 'openmeetings', 'openoffice',
          'shardingsphere', 'shiro', 'struts', 'zookeeper']
       1 ['axis',
          'cassandra', 'dolphinscheduler', 'doris', 'guacamole', 'ignite',
          'jmeter', 'kylin', 'logging', 'mina', 'ozone', 'pdfbox', 'roller',
          'superset']

    In total, as of 3 April 2023, we're tracking 153 (last months:
    154, 156) open issues across 53 projects, median age 78 days
    (last months: 91, 83 days). 56 of those issues have CVE names
    assigned.

    8 (last month: 8) of these issues, across 5 projects, are older
    than 365 days.

22 Mar 2023 [Mark J. Cox / Christofer]

- We continue working with projects to publish 'security model' pages on
 their websites, which help users understand what to expect from the
 project security-wise and security researchers on where to best
 focus their efforts.  In February such a page was published for
 Apache JMeter.

- We have been reviewing the CPE's that were assigned to our CVE's by
 NIST's NVD programme, and suggesting fixes to some
 inconsistencies/misclassifications we identified.

- We have done a similar review of the GitHub Security Advisory (GHSA)
 database, but found no inaccuracies here yet.

- We have started taking inventory of how Apache scores in the OpenSSF
 Scorecards project. We plan to improve these, both by providing
 Apache projects insight and actionable suggestions, and by improving
 the tool.

- We continue to work on https://cveprocess.apache.org, bringing our
 fork under the Apache GitHub organisation and sharing and
 documenting its deployment process.

- We worked with the infra team to improve some security features on
 www.apache.org that are sometimes flagged by security researchers.

Stats for February 2023:

       23	[support request/question not security notification]]
       20	[license confusion]
       4	[report/question relating to dependencies]

Security reports: 71 (last months: 59, 62, 84)

       8	['airflow']
       7	['website or other infrastructure']
       6	['tomcat']
       4	['logging']
       3	['commons', 'hadoop', 'httpd', 'openoffice']
       2	['hive', 'inlong', 'kafka', 'superset', 'trafficserver']
       1	['activemq', 'archiva', 'carbondata', 'cloudstack', 'couchdb', 'dolphinscheduler', 'druid', 'geode', 'guacamole', 'ibb', 'infra', 'iotdb', 'jspwiki', 'linkis', 'nifi', 'pdfbox', 'qpid', 'shenyu', 'shiro', 'sling', 'streampark', 'streampipes', 'submarine', 'zeppelin']

    In total, as of 1 March 2023, we're tracking 154 (last months:
    156, 160) open issues across 52 projects, median age 91
    days (last months: 83, 59 days). 54 of those issues have
    CVE names assigned.

    8 (last month: 7) of these issues, across 6 projects, are older
    than 365 days.

15 Feb 2023 [Mark J. Cox / Christofer]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice:

- We have published the ASF Security Report for
 2022. https://blogs.apache.org/security/entry/asf-security-report-2022

- We congratulate the APR project, who have released version 1.7.1,
 among other things fixing the long-standing CVE-2017-12613.

- Airflow continues to attract attention by security researchers,
 likely in part due their inclusion in a third part bug bounty
 program by HackerOne.  The PMC is responding to the reports at a
 steady pace.

- We are working with projects to publish "security model" pages on
 their websites, which help users understand what to expect from the
 project security-wise, and help security researchers on where to
 best focus their efforts.  In January such a page was published for
 Apache Maven.

Stats for January 2023:

       46      [license confusion]
       12      [support request/question not security notification]]
       2       [report/question relating to dependencies]

Security reports: 59 (last months: 62, 84, 69)

       12      ['airflow']
       12      [website or other infrastructure]
       4       ['tomcat']
       2       ['inlong', 'iotdb', 'logging', 'shiro', 'superset']

       1       ['ambari', 'commons', 'dolphinscheduler', 'druid',
               'eventmesh', 'fineract', 'flink', 'httpd', 'infrastructure',
               'james', 'kafka', 'kylin', 'linkis', 'maven', 'mxnet', 'nifi',
               'openoffice', 'royale', 'sling', 'spark', 'zeppelin']

    In total, as of 1 February 2023, we're tracking 156 (last months:
    160, 154) open issues across 59 projects, median age 83 days
    (last months: 59, 45 days). 46 of those issues have CVE names
    assigned.

    6 (last month: 6) of these issues, across 5 projects, are older
    than 365 days.

18 Jan 2023 [Mark J. Cox / Willem]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

- The https://cveprocess.apache.org/ tool was given a major overhaul
in order to support version 5 of the CVE JSON format.  The security
team can now publish a CVE direct to cve.org instantly via the tool
and we'll work on rolling that out to projects over time.

- We have further explored SBOM and VEX, and have started an
experiment publishing (non)exploitability information in a VEX format
for the Solr project, https://github.com/apache/solr-site/pull/86

- We have improved the accuracy of the reports we send to projects
with open security issues, and made them more easily actionable.

Stats for December 2022:

    27	[license confusion]
    21	[support request/question not security notification]
    5 	[report/question relating to dependencies]

Security reports: 62 (last months: 84, 69, 55)

    7       [web site/other infrastructure]
    5       ['commons', 'sling']
    4	['tomcat']
    3	['airflow', 'jena', 'solr']
    2	['fineract', 'guacamole', 'hadoop', 'shiro']
    1	['ambari', 'any23', 'camel', 'cassandra', 'cloudstack', 'dolphinscheduler', 'druid', 'dubbo', 'helix', 'httpd', 'iotdb', 'jspwiki', 'karaf', 'mxnet', 'ofbiz', 'openoffice', 'ozone', 'pivot', 'santuario', 'servicecomb', 'streampark', 'submarine', 'wicket', 'xalan']

 In total, as of 2 January 2023, we're tracking 160 (last months:
 154, 137) open issues across 65 projects, median age 59 days (last months:
 45, 53 days). 52 of those issues have CVE names assigned.

 6 (last months: 9, 10) of these issues, across 5 projects, are older
 than 365 days.

21 Dec 2022 [Mark J. Cox / Roy]

We have a higher number of open issues than usual and this is due to
high numbers of incoming queries. This is often bursty (and seasonal)
so is no concern, and we will continue to monitor it for trending.
Otherwise, continued work on incoming security issues, keeping
projects reminded of outstanding issues, and general oversight and
advice.

Stats for November 2022:

  25  [license confusion]
  18  [support request/question not security notification]
  7   [report/question relating to dependencies]

Security reports: 84 (last months: 69, 55, 42, 61)

   7  ['airflow']
   5  ['commons']
   4  ['sling']
   3  ['cocoon', 'shardingsphere', 'superset']
   2  ['derby', 'dolphinscheduler', 'doris', 'httpd', 'iotdb',
       'james', 'linkis', 'nifi', 'streampark', 'trafficserver',
       'xmlgraphics']

   1  ['activemq', 'ambari', 'ant', 'archiva', 'brooklyn', 'camel',
       'cxf', 'directory', 'druid', 'dubbo', 'freemarker', 'geronimo',
       'griffin', 'hama', 'hc', 'hive', 'jena', 'jmeter', 'jspwiki', 'kafka',
       'knox', 'manifoldcf', 'mina', 'netbeans', 'openmeetings', 'pulsar',
       'ranger', 'reef', 'roller', 'servicemix', 'shiro', 'solr',
       'subversion', 'tomcat', 'uima', 'zeppelin', 'zookeeper']

 In total, as of 1 December 2022, we're tracking 154 (last month:
 137) open issues across 59 projects, median age 45 days (last
 month: 53 days). 55 of those issues have CVE names assigned.

 9 (last month: 10) of these issues, across 5 projects, are older
 than 365 days.

16 Nov 2022 [Mark J. Cox / Sam]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Oct 2022:

  26       [license confusion]
  24       [support request/question not security notification]

Security reports: 69 (last months: 55, 42, 61)

  14       [commons]
  10       [airflow]
  3        [tomcat], [superset], [nifi], [skywalking]
  2        [openoffice], [kylin], [dolphinscheduler], [cxf], [archiva]
  1        [zeppelin], [ws], [trafficserver], [tapestry], [spark],
           [spamassassin], [sling], [shiro], [servicecomb], [sdap],
           [netbeans], [maven], [logging], [linkis], [jmeter], [inlong],
           [infrastructure], [httpd], [heron], [hadoop], [dubbo], [camel],
           [age]

 In total, as of 31st October 2022, we're tracking 137 (last month:
 101) open issues across 49 projects, median age 53 days (last month:
 78) days. 52 of those issues have CVE names assigned.

 10 (last month: 11) of these issues, across 6 projects, are older
 than 365 days.

19 Oct 2022 [Mark J. Cox / Christofer]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Sep 2022:

 26        [license confusion]
 24        [support request/question not security notification]

Security reports: 55 (last months: 42, 61, 30)

  5        [airflow]
  3        [httpd], [openoffice], [shenyu], [tomcat], [xmlgraphics]
  2        [archiva], [dolphinscheduler], [isis], [sling], [solr]
  1        [ambari], [calcite], [cassandra], [doris], [druid], [hadoop],
           [infrastructure], [inlong], [iotdb], [jmeter], [karaf], [linkis],
           [maven], [netbeans], [nifi], [ofbiz], [shardingsphere], [skywalking],
           [spamassassin], [spark], [streampark], [trafficcontrol],
           [trafficserver], [ws], [zeppelin]

 In total, as of 30th Sept 2022, we're tracking 101 (last month:
 92) open issues across 45 projects, median age 78 (last month:
 111) days.  52 of those issues have CVE names assigned.

 11 (last month: 10) of these issues, across 7 projects, are older
 than 365 days.

21 Sep 2022 [Mark J. Cox / Willem]

Over the last few months we have had liason with the Infra team who
created tooling to test for signature and other issues on project
downloads. The first run found issues in 61 projects. The latest run
was down to 28. The remaining issues are not major (signing public
keys missing from KEYS files) and we will manually followup with the
remaining projects over the coming months.

A flaw affecting configuration/script file used by a GitHub workflow
was reported in Apache Camel in April and fixed the next day and was
mentioned in the press this month. There was no CVE issued as there
was no security vulnerability in Camel itself and no action for end
users: https://www.theregister.com/2022/09/01/google_firebase_apache_camel_github/

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Aug 2022:

 27        [license confusion]
 17        [support request/question not security notification]

Security reports: 42 (last months: 61, 30, 44)

  6       [airflow]
  4       [site]
  3       [httpd]
  2       [flume], [logging], [openoffice], [shiro], [tomcat], [xmlgraphics]
  1       [activemq], [ambari], [ant], [arrow], [avro], [cassandra],
          [commons], [drill], [dubbo], [infrastructure], [maven], [openwhisk],
          [pulsar], [security], [solr], [superset], [trafficserver]

 In total, as of 1st Sept 2022, we're tracking 92 (last month:
 104) open issues across 39 projects, median age 111 (last month:
 107) days.  52 of those issues have CVE names assigned.

 10 (last month: 11, some + and -) of these issues, across 7
 projects, are older than 365 days.

17 Aug 2022 [Mark J. Cox / Christofer]

In July the Apache Xalan Java project was retired due to the inability to
create a release to fix a reported security issue.

The CSRB report on the Log4j event was released
https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf

We have a dedicated person starting in September to be the main
handler of incoming security issues.

Additionally, continued work on incoming security issues, keeping
projects reminded of outstanding issues, and general oversight and
advice.

Stats for Aug 2022:

 30        [license confusion]
 34        [support request/question not security notification]

Security reports: 61 (last months: 30, 44, 41)

 13        [site]
  4        [airflow], [dubbo], [httpd]
  3        [commons], [shiro], [superset]
  2        [cassandra], [kafka], [nifi], [spark], [struts]
  1        [archiva], [avro], [axis], [calcite], [cloudstack], [flex],
           [groovy], [hadoop], [jena], [logging], [maven], [milagro],
           [oozie], [shenyu], [skywalking], [tomcat], [xerces]

 In total, as of 1st August 2022, we're tracking 104 (last month:
 100) open issues across 39 projects, median age 107 (last month:
 101) days.  57 of those issues have CVE names assigned.

 10 (last month: 11) of these issues, across 7 projects, are older
 than 365 days.

20 Jul 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Note: Only July 14th the CSRB released their report on the Log4j
vulnerability. Links to it, summary, and future discussion:
https://lists.apache.org/thread/5xtmqg98c5d1783t6gybqgjloklpvy92

Stats for Jul 2022:

 27        [license confusion]
 34        [support request/question not security notification]

Security reports: 30 (last months: 44, 41, 47)

  5        [site]
  3        [iotdb]
  2        [commons], [geode], [nifi], [struts], [tomcat]
  1        [ant], [apr], [drill], [flume], [hc], [httpd],
           [ignite], [jspwiki], [tika], [trafficserver], [uima], [unomi]

 In total, as of 1st July 2022, we're tracking 100 (last month:
 111) open issues across 38 projects, median age 101 (last month:
 73) days.  63 of those issues have CVE names assigned.

 11 (last month: 9) of these issues, across 7 projects, are older
 than 365 days.

15 Jun 2022 [Mark J. Cox / Bertrand]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for May 2022:

 25        [license confusion]
 29        [support request/question not security notification]

Security reports: 44 (last months: 41, 47, 67)

  8        [zeppelin]
  5        [httpd]
  4        [site]
  2        [commons], [dolphinscheduler], [hadoop], [jspwiki],
           [spark], [tomcat]
  1        [airflow], [apr], [atlas], [dubbo], [kafka], [openoffice],
           [pulsar], [shardingsphere], [shiro], [sling], [struts],
           [superset], [tika], [trafficcontrol], [trafficserver]

 In total, as of 1st June 2022, we're tracking 111 (last month:
 91) open issues across 40 projects, median age 73 (last month:
 78) days.  61 of those issues have CVE names assigned.

 9 (last month: 10) of these issues, across 6 projects, are older
 than 365 days.

18 May 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Opened a position for a Security Response Program Manager
https://blogs.apache.org/security/entry/position-available-security-response-program

Stats for Apr 2022:

 18        [license confusion]
 42        [support request/question not security notification]

Security reports: 41 (last months: 47, 67, 71)

  9        [site]
  6        [airflow]
  3        [druid], [httpd]
  2        [apisix]
  1        [bookkeeper], [camel], [commons], [dolphinscheduler],
           [hc], [ignite] [jena], [logging], [nifi], [ofbiz],
           [openoffice], [shardingsphere], [shenyu], [spark],
           [tapestry], [tika], [tomcat], [xalan]

 In total, as of 1st May 2022, we're tracking 91 (last month:
 93) open issues across 42 projects, median age 78 (last month:
 61) days.  64 of those issues have CVE names assigned.

 10 (last month: 11) of these issues, across 7 projects, are older
 than 365 days.

20 Apr 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

David Nalley, Sam Ruby, and Mark Cox attended more various federal
government meetings during March around the Log4Shell (Log4j) issue.
Gary Gregory (Logging PMC) was involved in one call. We ensure that we
have a minimum of two ASF members at such meetings.

Received a request from the European Commission (FOSSEP) that is more
of a more long term consultation around the supply chain/vuln issues
as highlighted by log4j. This has brought to the attention of our
members with a call to action to seek volunteers and is being
discussed on the normal public security list. It is possible that this
effort at some point results in advice to the ASF for policy/process
improvements. https://lists.apache.org/thread/3m8whx8fp05f57kv50d16j515rxfyqml

Stats for Mar 2022:

 21        [license confusion]
 33        [support request/question not security notification]

Security reports: 47 (last months: 67, 71, 83)

  7        [httpd]
  5        [airflow]
  4        [site]
  3        [jspwiki], [trafficserver]
  2        [archiva], [dolphinscheduler], [nifi], [ofbiz],
           [openoffice], [pulsar]
  1        [activemq], [apisix], [commons], [directory], [druid],
           [hive], [james], [kafka], [maven], [netbeans], [poi],
           [solr], [tomcat]

 In total, as of 4th April 2022, we're tracking 93 (last month:
 83) open issues across 38 projects, median age 61 (last month:
 50) days.  57 of those issues have CVE names assigned.

 9 (last month: 10) of these issues, across 5 projects, are older
 than 365 days.

16 Mar 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  The workload
is starting to drop after the the larger number of issues reported
during December-January.

David Nalley and Mark Cox attended a Cyber Safety Review Board (CSRB)
meeting in February and Mark Cox attended a CERT/CC meeting in February
both around the Log4Shell (Log4j) issue.

Stats for Feb 2022:

 25        [license confusion]
 39        [support request/question not security notification]

Security reports: 67 (last months: 71, 83, 44)

  9        [site]
  6        [tomcat]
  4        [airflow], [trafficserver]
  3        [dubbo], [httpd], [jspwiki]
  2        [apisix], [apr], [dolphinscheduler], [flink],
           [hadoop], [openoffice], [spark]
  1        [any23], [axis], [commons], [couchdb], [druid],
           [freemarker], [hive], [ignite], [livy], [logging],
           [ofbiz], [pdfbox], [servicecomb], [shenyu], [shiro],
           [sling], [storm], [superset], [tika], [xml],
           [zeppelin]

 In total, as of 1st Mar 2022, we're tracking 83 (last month:
 83) open issues across 38 projects, median age 50 (last month:
 55) days.  55 of those issues have CVE names assigned.

 7 (last month: 5) of these issues, across 4 projects, are older
 than 365 days.

16 Feb 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  The workload
remains high as we work through the larger number of issues reported
during December-January.

We were invited, and attended, a forum to discuss open source software
security with the NSC at the White House in January 2022. A summary
was posted after the meeting to our public
security-discuss@community.apache.org list
https://lists.apache.org/thread/7bs1k791b5f0j4vzf0h6lwnv8doyjzck

We have been invited to a Senate hearing around log4j.  Please see the
Presidents remarks for more information.

Stats for Jan 2022:

 36        [license confusion]
 52        [support request/question not security notification]

Security reports: 71 (last months: 83, 44, 36)

   6       [site], [logging]
   4       [pinot]
   3       [httpd], [ofbiz], [shiro]
   2       [activemq], [airflow], [commons], [jspwiki], [pulsar],
           [shardingsphere], [solr], [zeppelin]
   1       [apisix], [camel], [chemistry], [dolphinscheduler], [doris], [drill],
           [druid], [dubbo], [felix], [flume], [geode], [hadoop], [infrastructure],
           [james], [jmeter], [kafka], [karaf], [kylin], [maven], ["multiple"],
           [openoffice], [rocketmq], [shenyu], [spark], [systemds], [tika],
           [tomcat], [trafficcontrol], [trafficserver], [xmlgraphics]

 In total, as of 1st Feb 2022, we're tracking 83 (last month:
 107) open issues across 46 projects, median age 55 (last month:
 62) days.  47 of those issues have CVE names assigned.

 4 (last month: 5, although 1 of them is different) of these
 issues, across 4 projects, are older than 365 days.

19 Jan 2022 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

We were invited, and will attend, a forum to discuss open source
software security with the NSC at the White House in January
2022. Details are being discussed on our public
security-discuss@community.apache.org list.

A vulnerability in Log4J 2 (CVE-2021-44228, "Log4Shell"), allowed
remote attackers to achieve remote code execution in a default and
likely installation. The issue was widely exploited, starting the day
before a release with a fix was published. After the fixed release a
few subsequent Log4J vulnerabilities were also fixed, but none had the
same impact or default conditions. This event triggered a large number
of enquiries and vulnerability reports as can be seen by the metrics
below. The security team worked to help the Logging PMC on this issue
before, during, and after its disclosure.

Stats for Dec 2021:

 32        [license confusion]
 111       [support request/question not security notification]

Security reports: 83 (last months: 44, 36, 47)

 14        [logging]
  6        [httpd]
  5        [commons]
  4        [tomcat]
  3        [cassandra], [infrastructure], [openoffice]
  2        [dubbo], [hadoop], [nifi], [sling], [solr], [superset]
           [zeppelin]
  1        [activemq], [airflow], [apisix], [archiva], [beam],
           [camel], [cayenne], [cocoon], [druid], [eventmesh],
           [flink], [freemarker], [guacamole], [hive], [ignite],
           [jackrabbit], [james], [jspwiki], [kafka], [maven],
           [multiple], [ofbiz], [ozone], [pdfbox], [portals],
           [shardingsphere], [shenyu], [skywalking], [spark],
           [storm], [struts], [trafficcontrol], [unomi]

 In total, as of 1st Jan 2022, we're tracking 107 (last month:
 89) open issues across 47 projects, median age 62 (last month:
 90) days.  49 of those issues have CVE names assigned.

 6 (last month: 5) of these issues, across 3 projects, are older
 than 365 days.

@Sander: follow up with PMCs about the role of the security team

15 Dec 2021 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Nov 2021:

 31        [license confusion]
 12        [support request/question not security notification]

Security reports: 44 (last months: 36, 47, 48)

  6        [site]
  3        [shenyu]
  2        [druid], [dubbo], [httpd], [shardingsphere],
           [skywalking], [storm], [tomcat], [trafficcontrol]
  1        [airflow], [apisix], [cassandra], [guacamole],
           [heron], [jspwiki], [kafka], [kylin], [linkis],
           [logging], [lucene], [mxnet], [nifi], [pdfbox],
           [shiro], [solr], [subversion], [superset],
           [trafficserver]

 In total, as of 1st Dec 2021, we're tracking 89 (last month:
 90) open issues across 42 projects, median age 90 (last month:
 87) days.  46 of those issues have CVE names assigned.

 5 (last month: 4) of these issues, across 3 projects, are older
 than 365 days.

17 Nov 2021 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Oct 2021:

 24        [license confusion]
 23        [support request/question not security notification]

Security reports: 36 (last months: 47, 48, 42)

  9       [site]
  5       [httpd], [druid]
  3       [superset]
  2       [airflow], [dubbo], [solr]
  1       [avro], [guacamole], [hadoop], [plc4x], [syncope],
          [tomcat], [trafficcontrol], [trafficserver]

 In total, as of 1st Nov 2021, we're tracking 90 (last month:
 92) open issues across 40 projects, median age 87 (last month:
 78) days.  57 of those issues have CVE names assigned.

 4 (last month: 4) of these issues, across 3 projects, are older
 than 365 days.

20 Oct 2021

Update Apache Security Team Membership

 WHEREAS, the Apache Software Foundation (ASF) Board Commmittee,
 known as the Apache Security Team expects to better serve
 its purpose through the periodic update of its membership; and

 WHEREAS, the Apache Security Team is a Board-appointed committee
 whose membership must be approved by Board resolution;

 NOW, THEREFORE, BE IT RESOLVED, that the following ASF
 members be added as Apache Security Team members:

 PJ Fanning <fanningpj@apache.org>

 Special Order 7A, Update Apache Security Team Membership, was
 approved by Unanimous Vote of the directors present.

20 Oct 2021 [Mark J. Cox / Sharan]

This month we gave a keynote talk about the security committee, the
US Executive Order on cybersecurity, and third party security projects
such as those under the OpenSSF.

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Sep 2021:

 27        [license confusion]
 20        [support request/question not security notification]

Security reports: 47 (last months: 48, 42, 56)

  5        [superset]
  4        [site], [httpd]
  3        [airflow]
  2        [airavata], [shiro], [tomcat],
  1        [activemq], [db], [druid], [dubbo], [echarts], [guacamole],
           [hc], [heron], [infrastructure], [james], [jspwiki], [logging],
           [milagro], [mina], [mxnet], [ofbiz], [openmeetings], [ozone],
           [parquet], [pulsar], [shardingsphere], [storm], [struts],
           [trafficserver], [zeppelin]

 In total, as of 1st Oct 2021, we're tracking 92 (last month:
 90) open issues across 44 projects, median age 78 (last month:
 85) days.  65 of those issues have CVE names assigned.

 4 (last month: 7) of these issues, across 3 projects, are older
 than 365 days.

15 Sep 2021 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Aug 2021:

 33        [license confusion]
 26        [support request/question not security notification]

Security reports: 48 (last months: 42, 56, 45)

 18      [site]
 4       [ofbiz]
 3       [airflow], [james]
 2       [any23], [guacamole], [jspwiki], [knox]
 1       [brooklyn], [dubbo], [flink], [httpd], [jena],
         [karaf], [logging], [nifi], [ranger], [spamassassin],
         [tomcat], [zeppelin]

 In total, as of 1st Sep 2021, we're tracking 90 (last month:
 82) open issues across 39 projects, median age 85 (last month:
 73) days.  69 of those issues have CVE names assigned.

 7 (last month: 7) of these issues, across 5 projects, are older
 than 365 days.

18 Aug 2021 [Mark J. Cox / Sharan]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Jul 2021:

 35        [license confusion]
 12        [support request/question not security notification]

Security reports: 42 (last months: 56, 45, 41)

 10        [site]
 8         [airflow]
 3         [dubbo]
 2         [ofbiz], [portals], [spark], [tomcat]
 1         [ant], [couchdb], [druid], [gobblin], [httpd],
           [nifi], [ozone], [shenyu], [sling], [solr],
           [spamassassin], [struts], [trafficcontrol],
           [trafficserver]

 In total, as of 1st Aug 2021, we're tracking 82 (last month:
 85) open issues across 34 projects, median age 73 (last month:
 54) days.  61 of those issues have CVE names assigned.

 7 (last month: 6) of these issues, across 5 projects, are older
 than 365 days.

21 Jul 2021 [Mark J. Cox / Roman]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Jun 2021:

 31        [license confusion]
 26        [support request/question not security notification]

Security reports: 56 (last months: 45, 41, 27, 46)

 16        [site]
 11        [dubbo]
 3         [airflow], [commons], [httpd]
 2         [ozone], [superset], [trafficserver]
 1         [apr], [directory], [flink], [geode], [hadoop],
           [infrastructure], [kafka], [openoffice], [roller],
           [shiro], [solr], [storm], [tinkerpop], [tomcat]

 In total, as of 1st Jul 2021, we're tracking 85 (last month:
 77) open issues across 35 projects, median age 54 (last month:
 60) days.  45 of those issues have CVE names assigned.

 6 (last month: 8) of these issues, across 5 projects, are older
 than 365 days.

16 Jun 2021 [Mark J. Cox / Roman]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for May 2021:

 32        [license confusion]
 19        [support request/question not security notification]

 Security reports: 45 (last months: 41, 27, 46, 46)

 16        [site]
 4         [trafficserver]
 3         [airflow], [hadoop], [solr]
 1         [httpd], [openoffice], [tomcat]
           [commons], [dubbo], [hbase], [infrastructure], [jena],
           [kylin], [nifi], [nuttx], [ofbiz], [roller], [skywalking],
           [superset], [tapestry]

 In total, as of 1st Jun 2021, we're tracking 77 (last month: 76)
 open issues across 36 projects, median age 60 (last month: 83)
 days.  54 of those issues have CVE names assigned.

 6 (last month: 9) issues, across 4 projects, are older than 365
 days.

19 May 2021 [Mark J. Cox / Roy]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Apr 2021:

 28        [license confusion]
 21        [support request/question not security notification]

Security reports: 41 (last months: 27, 46, 46)

 12        [site]
 5         [httpd]
 3         [pdfbox]
 2         [tomcat], [trafficserver]
 1         [apisix], [cxf], [druid], [dubbo], [hadoop], [hive],
           [ignite], [juddi], [kylin], [ofbiz], [openoffice],
           [shiro], [solr], [tapestry], [tvm], [xerces]

 In total, as of 1st May 2021, we're tracking 76 (last month:
 80) open issues across 37 projects, median age 83 (last month:
 56) days.  51 of those issues have CVE names assigned.

 9 (last month: 9) of these issues, across 8 projects, are older
 than 365 days.

21 Apr 2021 [Mark J. Cox / Sam]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Mar 2021:

 24        [license confusion]
 13        [support request/question not security notification]

Security reports: 27 (last months: 46, 46, 45)

  4        [solr]
  3        [trafficserver]
  2        [commons]

  1        [airflow], [apisix], [archiva], [axis], [druid], [dubbo]
           [geode], [groovy], [hadoop], [httpd], [impala],
           [infrastructure], [ofbiz], [pdfbox], [shiro], [subversion],
           [superset], [tapestry], [velocity]

 In total, as of 1st Apr 2021, we're tracking 80 (last month:
 76) open issues across 40 projects, median age 56 (last month:
 62) days.  49 of those issues have CVE names assigned.

 9 (last month: 9) of these issues, across 8 projects, are older
 than 365 days.

17 Mar 2021 [Mark J. Cox / Sharan]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

We recently started spending more time on stalled issues to get them
moving again, and this has led to a some of the old issues being
completed. Unfortunately we also have had to escalate issues to a
handful of unresponsive PMCs, both directly and by using board
roll-calls. Some of this escalation has worked, but we continue to
stay on top of the rest until resolution.

Stats for Feb 2021:

 25        [license confusion]
 32        [support request/question not security notification]

Security reports: 46 (last months: 46, 45, 45)

 10        [site]
  7	       [druid]
  3        [zeppelin]
  2        [airflow], [commons], [infrastructure], [lucene], [pdfbox],
           [shiro], [superset]
  1        [dolphinscheduler], [dubbo], [hadoop], [httpd], [openoffice],
           [shardingsphere], [struts], [tapestry], [tika], [tomcat],
           [trafficserver], [unomi]

 In total, as of 1st Mar 2021, we're tracking 76 (last month:
 67) open issues across 44 projects, median age 62 (last month:
 61) days.  48 of those issues have CVE names assigned.

 10 (last month: 9) of these issues, across 8 projects, are older
 than 365 days.

17 Feb 2021 [Mark J. Cox / Sander]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

This month we sent requests for information to 23 projects which had
old or stale outstanding security issues either that needed triage
completing or releases making.  Most projects responded by the
deadline with an updated status report and a number of issues were
closed/completed (some included in the stats below, some after).  We
still have some projects that are not dealing with their security
issues appropriately and we have continued to escalate these to the
projects themselves and the board where needed.

Where projects are unresponsive it reflects badly on the ASF and can
lead to users being exposed when reporters choose to go public without
a co-ordinated fix.  We worked with Press on the response to this
story:
https://www.bleepingcomputer.com/news/security/undisclosed-apache-velocity-xss-vulnerability-impacts-gov-sites/

We published the 2020 Security Report https://s.apache.org/SecurityReport2020

Stats for Jan 2021:

 26        [license confusion]
 12        [support request/question not security notification]

Security reports: 46 (last months: 45, 45, 41)

 15        [site]
 3         [tomcat]
 2         [airflow], [flink]
 1         [commons], [cxf], [druid], [gobblin], [httpd], [hudi],
           [jmeter], [maven], [mina], [myfaces], [netty], [nutch],
           [nuttx], [ofbiz], [openmeetings], [openoffice], [poi],
           [pulsar], [ranger], [shiro], [skywalking], [struts],
           [trafficserver], [xerces]

 In total, as of 1st Feb 2021, we're tracking 67 (last month:
 68) open issues across 42 projects, median age 61 (last month:
 80) days.  38 of those issues have CVE names assigned.

 9 (last month: 7) of these issues, across 5 projects, are older
 than 365 days.  Some require esclation.

20 Jan 2021 [Mark J. Cox / Justin]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

In December the ASF became the first organisation to get a live CVE
name using the new CVE project automation API. Instead of the security
team holding a pool of names requested in advance we now allocate them
on demand, with the service taking care of emails to the PMC and other
previously manual parts of the process. We expect more automation
available over the coming year allowing us to streamline the CVE
process for projects even further.

Special thanks go to Accumulo, Airflow, CXF, NuttX, Tomcat, and Unomi
who all used the new portal to handle vulnerabilities.

Stats for Dec 2020:

 18      [license confusion]
 11      [support request/question not security notification]

Security reports: 45 (last months: 45, 41, 32)

  9      [site]
  4      [servicecomb]
  3      [httpd], [shardingsphere], [struts]
  2      [activemq], [dubbo], [hadoop], [hbase], [openoffice], [tomcat]
  1      [accumulo], [cordova], [flink], [gobblin], [infrastructure],
         [kafka], [kylin], [maven], [myfaces], [shiro], [skywalking],
         [wicket]

 In total, as of 30th December 2020, we're tracking 68 (last
 month: 64) open issues across 33 projects, median age 80 (last
 month: 90) days.  29 of those issues have CVE names assigned.

 7 (unchanged since last month) of these issues, across 4
 projects, are older than 365 days.  None require escalation.

16 Dec 2020 [Mark J. Cox / Shane]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

A couple of projects used our new CVE process web system for handling
their issues and we continue to work on it, waiting for Mitre to roll
out the production automation APIs.

Stats for Nov 2020:

 21        [license confusion]
 11        [support request/question not security notification]

Security reports: 45 (last months: 41, 32, 24, 38)

 14        [site]
 3         [httpd], [struts]
 2         [hive], [maven]
 1         [activemq], [airflow], [axis], [cxf], [flink], [hadoop], [hama],
           [kylin],  [mina], [netbeans], [nuttx], [ozone], [pulsar],
           [shardingsphere], [shiro], [skywalking], [subversion], [tomcat],
           [trafficcontrol], [trafficserver], [unomi]

 In total, as of 1st December 2020, we're tracking 64 (last month:
 69) open issues across 34 projects, median age 90 (last month:
 82) days.  33 of those issues have CVE names assigned.

 7 (last month: 8) of these issues, across 4 projects, are older
 than 365 days.  None require escalation.

18 Nov 2020 [Mark J. Cox / Craig]

Currently, each PMC is responsible for writing up their own CVE
entries and submitting them to Mitre. This leads to many delays in the
CVE database being updated with Apache issues as entries are often
rejected as the legacy format causes issues. We are working on a tool,
hosted on an infra-managed VM, that will provide PMCs dealing with
security issues a way to edit, validate, and submit their entries to
Mitre. We are leveraging upcoming changes to CVE automation that will
also allow us to request and allocate CVE names to projects
on-the-fly.  It may allow in the future us to delegate the entire
workflow to the PMCs that handle a lot of issues; with them able to
self-service request a CVE through to making it live in the CVE list,
but for others we can continue to help them through the process, this
will just make it simpler.

Also, continued work on incoming security issues, keeping projects
reminded of outstanding issues, and general oversight and advice.

Stats for Oct 2020:

 24        [license confusion]
 21        [support request/question not security notification]

Security reports: 41 (last months: 32, 24, 38, 46)

  11      [site]
   2      [apr], [fineract], [lucene], [openoffice], [sling],
          [trafficserver]
   1      [activemq], [airflow], [ambari], [cassandra],
          [couchdb], [druid], [groovy], [hama], [hive], [nifi],
          [oozie], [poi], [shiro], [tomcat], [tvm], [velocity],
          [xerces], [xmlgraphics]

 In total, as of 1st November 2020, we're tracking 69 (last month:
 69) open issues across 36 projects, median age 82 (last month:
 89) days.  30 of those issues have CVE names assigned.

 8 (last month: 9) of these issues, across 4 projects, are older
 than 365 days.  None require escalation.

21 Oct 2020 [Mark J. Cox / Niclas]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Sep 2020:

 27        [license confusion]
 14        [support request/question not security notification]

Security reports: 32 (last months: 24, 38, 46, 41)

  7       [site]
  3       [httpd], [superset]
  2	      [activemq], [dubbo], [tomcat]
  1	      [airflow], [cxf], [druid], [hc], [impala],
          [infrastructure], [logging], [lucene], [openmeetings],
          [poi], [pulsar], [struts], [trafficserver]

 In total, as of 1st October 2020, we're tracking 69 (last month:
 68) open issues across 37 projects, median age 89 (last month:
 67) days.  33 of those issues have CVE names assigned.

 9 (last month: 8) of these issues, across 6 projects, are older
 than 365 days.  None require escalation.

16 Sep 2020 [Mark J. Cox / Sam]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Aug 2020:

 16        [license confusion]
 24        [support request/question not security notification]

Security reports: 24 (last months: 38, 46, 41, 36)

  6        [site]
  4        [ofbiz]
  3        [airflow], [dubbo]
  2        [openoffice]
  1        [activemq], [apisix], [calcite], [cassandra], [nifi], [shiro]

 In total, as of 1st September 2020, we're tracking 68 (last month:
 84) open issues across 38 projects, median age 67 (last month:
 57) days.  41 of those issues have CVE names assigned.

 8 (last month: 9) of these issues, across 6 projects, are older
 than 365 days.  None require escalation.

19 Aug 2020 [Mark J. Cox / Sam]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Jul 2020:

 22        [license confusion]
 25        [support request/question not security notification]

Security reports: 38 (last months: 46, 41, 36, 43)

  5        [site]
  2        [dubbo], [httpd], [kylin], [openoffice], [shiro],
           [tapestry], [tomcat]
  1        [activemq], [apisix], [commons], [cordova], [couchdb],
           [hive], [infrastructure], [jspwiki], [livy], [mina],
           [nifi], [ofbiz], [pulsar], [shardingsphere], [sling],
           [spark], [tomee], [vcl], [zeppelin]

 In total, as of 3rd August 2020, we're tracking 84 (last month:
 73) open issues across 45 projects, median age 57 (last month:
 61) days.  49 of those issues have CVE names assigned.

 9 (last month: 9) of these issues, across 7 projects, are older
 than 365 days.  None require escalation.

15 Jul 2020 [Mark J. Cox / Patricia]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Jun 2020:

 21        [license confusion]
 21        [support request/question not security notification]

Security reports: 46 (last months: 41, 36, 43, 23)

  6	       [airflow]
  4	       [site]
  3	       [guacamole], [httpd], [ofbiz], [tomcat]
  2	       [ambari], [dubbo], [lucene], [struts]
  1	       [activemq], [ant], [brooklyn], [cocoon], [dolphinscheduler],
           [flink], [ignite], [jackrabbit],
           [karaf], [kylin], [netbeans], [opennlp], [roller], [skywalking]
           [unomi], [xmlgraphics]

 In total, as of 1st July 2020, we're tracking 73 (last month:
 74) open issues across 36 projects, median age 61 (last month:
 53) days.  45 of those issues have CVE names assigned.

 9 (last month: 9) of these issues, across 6 projects, are older
 than 365 days.  None require escalation.

17 Jun 2020 [Mark J. Cox / Patricia]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for May 2020:

 22        [license confusion]
 21        [support request/question not security notification]

 Security reports: 41 (last months: 36, 43, 23, 40)

  3        [airflow]
  2        [camel], [cloudstack], [hive], [httpd], [infrastructure],
           [tomcat], [trafficserver]
  1        [activemq], [archiva], [atlas], [cordova], [cxf], [hc],
          [jackrabbit], [kylin], [ofbiz], [openoffice], [opennlp],
           [samza], [shiro], [synapse], [syncope], [tomee],
           [trafficcontrol], [unomi], [usergrid], [vxquery],
           [wicket], [xmlgraphics], [zeppelin], [zookeeper]

 In total, as of 1st June 2020, we're tracking 74 (last month:
 71) open issues across 44 projects, median age 53 (last month:
 65) days.  37 of those issues have CVE names assigned.

 9 (last month: 8) of these issues, across 6 projects, are older
 than 365 days.  None require escalation.

20 May 2020 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for Apr 2020:

  18        [license confusion]
  22	[support request/question not security notification]

  Security reports: 36 (last months: 43, 23, 40, 23)

  5	       [site]
  4	       [nifi]
  3	       [httpd]
  2	       [tomcat],[trafficserver]
  1	       [airflow], [camel], [cassandra], [cordova], [couchdb],
           [cxf], [dolphinscheduler], [freemarker], [guacamole],
           [hadoop], [hc], [ignite], [kafka], [logging], [ofbiz],
           [sentry], [shiro], [spark], [syncope], [tika]

 In total, as of 1st May 2020, we're tracking 71 (last month:
 58) open issues across 43 projects, median age 65 (last month:
 61) days.  39 of those issues have CVE names assigned.

 8 (last month: 8) of these issues, across 6 projects, are older
 than 365 days.  None require escalation.

15 Apr 2020 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

In the stats below "site" refers to things where people report issues
that are not specific to a projects code, for example most of these are
reports of missing DMARC records, or lack of clickjacking protection,
or reports of open directory listings.  Almost none of these are actual
real issues, those that are get escalated to infra.

Stats for Mar 2020:

  29        [license confusion]
  13	[support request/question not security notification]

  Security reports: 43 (last months: 23, 40, 23, 31)


  13      [site]
  2       [flink], [lucene], [shiro], [skywalking], [tomcat]
  1       [ambari], [atlas], [camel], [couchdb], [cxf], [druid]
          [freemarker], [guacamole], [hadoop], [hc], [heron],
          [ignite], [jena], [kylin], [openmeetings], [syncope],
          [thrift], [velocity], [xerces], [zeppelin]

 In total, as of 1st April 2020, we're tracking 58 (last month:
 52) open issues across 35 projects, median age 61 (last month:
 81) days.  33 of those issues have CVE names assigned.

 8 (last month: 6) of these issues, across 6 projects, are older
 than 365 days. None require board escalation.

18 Mar 2020 [Mark J. Cox / Danny]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

This month saw an issue in Tomcat CVE-2020-1938 which gained press
interest when it was given branding and a name and was disclosed by a
third-party co-ordination centre before Tomcat released an advisory
(although after the issue was fixed in new releases of Tomcat).
Although serious if exploited, it only affected Tomcat installations
which exposed an unprotected AJP Connector to untrusted networks
(which is already not a good thing to do even without this issue).
That limits the number of affected installations.

Stats for Feb 2020:

  20        [license confusion]
  26	[support request/question not security notification]

  Security reports: 23 (last months: 40, 23, 31, 29)

  6	        [dubbo]
  5         [site]
  2	        [tika]
  1	        [asterixdb], [cloudstack], [guacamole], [httpd], [iotdb],
  1	        [logging], [openwhisk], [sling], [spamassassin], [tomcat]

 In total, as of 1st March 2020, we're tracking 52 (last month:
 53) open issues across 30 projects, median age 81 (last month:
 69) days.  37 of those issues have CVE names assigned.

 6 (last month: 4) of these issues, across 3 projects, are older
 than 365 days.  None require escalation.

19 Feb 2020 [Mark J. Cox / Ted]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

This month we published a look at Security for 2019
https://s.apache.org/security2019

Stats for Jan 2020:

  16        [license confusion]
  12	[support request/question not security notification]

  Security reports: 40 (last months: 23, 31, 29, 28)

  3	       [httpd], [nifi], [tomcat]
  2	       [hadoop], [spamassassin], [trafficserver]

  1	       [activemq], [ant], [aries], [beam], [brooklyn],
           [cayenne], [cloudstack], [commons], [hc], [hive],
           [infrastructure], [jackrabbit], [jspwiki], [kafka],
           [kylin], [manifoldcf], [nuttx], [ofbiz], [olingo],
           [openoffice], [portals], [shardingsphere], [shiro],
           [superset], [zookeeper]

 In total, as of 3 February 2020, we're tracking 53 (last month:
 49) open issues across 32 projects, median age 69 (last month:
 116) days.  36 of those issues have CVE names assigned.

 4 (last month: 4) of these issues, across 3 projects, are older
 than 365 days.  None require escalation.

15 Jan 2020 [Mark J. Cox / Myrle]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  Lots of effort
to close out old stale issues continues.

Stats for December 2019:

   9        [license confusion]
  16	[support request/question not security notification]

  Security reports: 23 (last months: 31, 29, 28, 46)

   5	[site]
   3	[httpd]
   2	[tomcat]
   1	[activemq], [camel], [commons], [cxf], [hadoop], [kylin],
            [logging], [maven], [rocketmq], [spark], [struts],
            [trafficserver], [xerces]

 In total, as of 6 January 2020, we're tracking 49 (last month:
 60) open issues across 26 projects, median age 116 (last month:
 119) days.  30 of those issues have CVE names assigned.

 4 (last month: 7) of these issues, across 3 projects, are older
 than 365 days.

18 Dec 2019 [Mark J. Cox / Rich]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for November 2019:

  15        [license confusion]
  12	[support request/question not security notification]

  Security reports: 31 (last months: 29, 28, 46, 26)

  3	       [cxf], [lucene], [site]
  2	       [httpd], [olingo], [struts]
  1	       [cordova], [directory], [dubbo], [flink], [hive],
           [infrastructure], [kudu], [nifi], [shiro], [spamassassin],
           [syncope], [tomcat], [trafficcontrol], [ws], [xerces],
           [xmlgraphics]

 In total, as of 1st December 2019, we're tracking 60 (last month:
 74) open issues across 32 projects, median age 119 (last month:
 88) days.  36 of those issues have CVE names assigned.

 7 (last month: 7) of these issues, across 5 projects, are older
 than 365 days.

20 Nov 2019 [Mark J. Cox / Daniel]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for October 2019:

  3	        [license confusion]
  14	[support request/question not security notification]

  Security reports: 29 (last months: 28, 46, 26, 23)

  5       [site]
  4	      [httpd], [tomcat]
  3	      [guacamole]
  2	      [cloudstack], [netbeans]
  1	      [airflow], [deltaspike], [dubbo], [hadoop], [infrastructure],
          [jmeter], [ofbiz], [struts], [xmlgraphics]

 In total, as of 31st Oct 2019, we're tracking 74 (last month:
 81) open issues across 37 projects, median age 88 (last month:
 75) days.  37 of those issues have CVE names assigned.

 7 (last month: 8) of these issues, across 5 projects, are older
 than 365 days.

@Danny: speak with Mark about how to handle Ambari and Xerces

16 Oct 2019 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for September 2019:

  13	[license confusion]
  10	[support request/question not security notification]

  Security reports: 28 (last months: 46, 26, 23, 44, 29)

  4       [site]
  3	      [hadoop]
  2	      [airflow], [arrow], [jspwiki], [openoffice]
  1	      [ambari], [camel], [cxf], [httpd], [infrastructure],
  	      [jmeter], [lucene], [nifi], [poi], [sentry], [shiro],
          [trafficserver], [zeppelin]

 In total, as of 30th September 2019, we're tracking 81 (last month:
 82) open issues across 38 projects, median age 75 (last month:
 88) days.  40 of those issues have CVE names assigned.

 7 (last month: 8) of these issues, across 4 projects, are older
 than 365 days.

18 Sep 2019 [Mark J. Cox / Joan]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for August 2019:

  15	[license confusion]
  14	[support request/question not security notification]

  Security reports: 46 (last months: 26, 23, 44, 29)

  6	       [openoffice],[site]
  5	       [zeppelin]
  2	       [airflow],[hadoop],[infrastructure],[kafka],[lucene],
           [trafficserver],[zookeeper]
  1	       [ambari],[apr],[cloudstack],[commons],[dubbo],[guacamole],
           [jspwiki],[nifi],[ofbiz],[royale],[santuario],[subversion],
           [tomcat],[trafficcontrol]

 In total, as of 10th September 2019, we're tracking 82 (last month:
 66) open issues across 36 projects, median age 88 (last month:
 111) days.  47 of those issues have CVE names assigned.

 8 (last month: 7) of these issues, across 5 projects, are older
 than 365 days.

21 Aug 2019 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Some of the security team will be presents at ApacheCon NA and running
a BoF https://www.apachecon.com/acna19/s/#/scheduledEvent/1337

Stats for July 2019:

  12	[license confusion]
  14	[support request/question not security notification]

  Security reports: 26 (last months: 23, 44, 29, 39)

  7	       [ambari]
  4	       [httpd]
  3	       [infrastructure], [site]
  2	       [tika], [tomcat]
  1	       [geode], [hadoop], [ranger], [spark], [thrift]

 In total, as of 1st August 2019, we're tracking 66 (last month:
 64) open issues across 33 projects, median age 111 (last month:
 120) days.  46 of those issues have CVE names assigned.

 7 (last month: 8) of these issues, across 4 projects, are older
 than 365 days.

17 Jul 2019

Update Apache Security Team Membership

 WHEREAS, the Apache Software Foundation (ASF) Board Commmittee,
 known as the Apache Security Team expects to better serve
 its purpose through the periodic update of its membership; and

 WHEREAS, the Apache Security Team is a Board-appointed committee
 whose membership must be approved by Board resolution;

 NOW, THEREFORE, BE IT RESOLVED, that the following ASF
 members be added as Apache Security Team members:

 Yann Ylavic <ylavic@apache.org>
 Dirk-Willem van Gulik <dirkx@apache.org>

 Special Order 7A, Update Apache Security Team Membership, was
 approved by Unanimous Vote of the directors present.

17 Jul 2019 [Mark J. Cox / Myrle]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  We have a
proposed resolution for this board meeting to expand the security team
to include Yann Ylavic and Dirk-Willem van Gulik, both of whom have
been on the security alias and doing security related work for some
time.

This month included the security disclosure by a researcher who found
several Apache projects used build scripts that would download
dependencies over http rather than https.  Prior to public disclosure,
we worked to address these examples and also contacted all Apache
projects to have them check build scripts and change to downloading
dependencies securely.  As a result, a number of Apache projects made
changes to their dependencies, some declared they were not affected,
and a few are in the process of being updated.

Stats for June 2019:

  12         [license confusion]
  10         [support request/question not security notification]

  Security reports: 23 (last months: 44, 29, 39, 35)

  3          [spark], [web site related]
  2          [httpd], [infrastructure], [lucene], [trafficcontrol]
  1          [activemq], [allura], [axis], [beanutils], [commons],
             [nifi], [openoffice], [struts], [zookeeper]

 In total, as of 1st July 2019, we're tracking 64 (last month:
 73) open issues across 36 projects, median age 120 (last month:
 91) days.  45 of those issues have CVE names assigned.

 8 (last month: 8) of these issues, across 5 projects, are older
 than 365 days.

19 Jun 2019 [Mark J. Cox / Danny]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  Had a discussion
with Mitre over the slow response to issues and how ASF operates in
handling security issues with a view to better supporting us in the CVE
process.

Stats for May 2019:

  11         [license confusion]
  12         [support request/question not security notification]

  Security reports: 44 (last months: 29, 39, 35)

   6 [web site related]
   4 [httpd]
   3 [sling], [tomcat]
   2 [guacamole], [hadoop], [infrastructure], [nifi], [zeppelin]
   1 [airflow], [archiva], [cassandra], [drill], [felix], [hbase],
     [hive], [impala], [jetspeed], [jspwiki], [mina], [openoffice],
            [shiro], [skywalking], [spark], [struts], [tika],
            [trafficserver],

 In total, as of 3rd June  2019, we're tracking 73 (last month:
 65) open issues across 37 projects, median age 91 (last month:
 82) days.  44 of those issues have CVE names assigned.

 8 (last month: 8) of these issues, across 5 projects, are older
 than 365 days.

15 May 2019 [Mark J. Cox / Craig]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  There are
continuing issues with Mitre taking several weeks to update the CVE
database for some issues.

The Zeppelin project continued to not deal with outstanding security
issues despite numerous contact attempts and even a board escalation.
The issues had already been fixed in their code base for some time,
but the process to notify users via a security advisory and publish
the CVE names had not been completed.  After a final warning, the
Security Team Project therefore took the unfortunate step of
publishing the details on their behalf:
https://www.openwall.com/lists/oss-security/2019/04/23/1

Stats for April 2019:

  8          [license confusion]
  15         [support request/question not security notification]

  Security reports: 29 (last months: 39, 35, 38)

    6       [httpd]
    4       [lucene]
    3       [site]
    2       [pdfbox], [shiro], [tomcat]
    1       [atlas], [commons], [fineract], [hadoop], [hive],
            [jspwiki], [kafka], [ofbiz], [struts],
            [trafficserver]

 In total, as of 1st May 2019, we're tracking 65 (last month:
 84) open issues across 35 projects, median age 82 (last month:
 66) days.  44 of those issues have CVE names assigned.

 8 (last month: 12) of these issues, across 5 projects, are older
 than 365 days.

17 Apr 2019

 Mark Thomas says "This is a reminder that, as a board committee, the
 security committee needs to have a serving board member as a member of
 that committee.  As I am no longer a board member, I believe the board
 needs to appoint a board member to the committee."

 We need to resolve this ASAP.

 Craig Russell was appointed to the Security Team, by General Consent.

17 Apr 2019 [Mark J. Cox / Jim]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  There are
continuing issues with Mitre taking up to 2 weeks to update the CVE
database.

Stats for March 2019:

  15        [license confusion]
  12        [support request/question not security notification]

  Security reports: 39 (last months: 35, 38, 16)

  15      [hack or license confusion]
  12      [support request not a security issue]
  7       [tomcat]
  4       [infrastructure]
  3       [httpd], [jspwiki]
  2       [roller], [struts]
  1       [airflow], [commons], [cxf], [dubbo], [hc],
          [kafka], [karaf], [libcloud], [lucene], [mina],
          [poi], [qpid], [shiro], [sling], [spamassassin],
          [spark], [tapestry], [zeppelin], [zookeeper]

 In total, as of 1st April 2019, we're tracking 84 (last month:
 85) open issues across 43 projects, median age 66 (last month:
 77) days.  57 of those issues have CVE names assigned.

 12 (last month: 7) of these issues, across 6 projects, are older
 than 365 days.

Craig Russell was appointed to the Security Team, by General Consent.

20 Mar 2019 [Mark J. Cox / Shane]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  There are
continuing issues with Mitre taking up to 2 weeks to update the CVE
database.

Stats for February 2019:

   8        [license confusion]
  21        [support request/question not security notification]

  Security reports: 35 (last months: 38, 16, 34)

   3	[httpd], [incubator/superset]
   2	[activemq], [airflow], [hadoop], [openoffice], [site], [thrift]

   1	[archiva], [commons], [cordova], [groovy], [hbase], [hc],
            [incubator/ponymail], [infrastructure], [jspwiki], [mesos],
            [nifi], [roller], [storm], [struts], [subversion], [tomcat],
            [zookeeper]

 In total, as of 1st March 2019, we're tracking 85 (last month:
 78) open issues across 43 projects, median age 77 (last month:
 75) days.  61 of those issues have CVE names assigned.

 7 (last month: 8) of these issues, across 6 projects, are older
 than 365 days.

20 Feb 2019 [Mark J. Cox / Bertrand]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.  During
January we saw some delays with Mitre updating their site with our CVE
submissions to them, they expect this to resolve soon.

Stats for January 2019:

  15        [license confusion]
   9        [support request/question not security notification]

  Security reports: 38 (last months: 16, 34, 28)

  6	       [httpd], [site]
  3	       [ambari]
  2	       [kafka], [struts], [tomcat]
  1	       [activemq], [axis], [camel], [cassandra], [couchdb],
           [fineract], [guacamole], [james], [karaf], [lucene],
           [mifos], [netbeans], [ofbiz], [openoffice], [qpid],
           [sling], [zookeeper]

 In total, as of 1st February 2019, we're tracking 78 (last month:
 81) open issues across 39 projects, median age 75 (last month:
 109) days.  49 of those issues have CVE names assigned.

 8 (last month: 13) of these issues, across 6 projects, are older
 than 365 days.

16 Jan 2019 [Mark J. Cox / Ted]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for December 2018:

  13        [license confusion]
   6        [support request/question not security notification]

  Security reports: 16 (last months: 34, 28, 32)

  3	       [fineract]
  2	       [zeppelin]
  1	       [ambari], [camel], [hadoop], [hc], [incubator/superset],
           [jspwiki], [myfaces], [roller], [superset], [site], [tapestry]

 In total, as of 1st January 2019, we're tracking 81 (last month:
 93) open issues across 37 projects, median age 109 (last month:
 78) days.  54 of those issues have CVE names assigned.

 13 (last month: 7) of these issues, across 6 projects, are older
 than 365 days.

19 Dec 2018 [Mark J. Cox / Isabel]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for November 2018:

  5         [license confusion]
  12        [support request/question not security notification]

  Security reports: 34 (last months: 28, 32, 37)

  10	[ofbiz]
  2	        [lucene], [struts]
  1         [activemq], [ambari], [commons], [guacamole], [hadoop],
            [hc], [httpd], [ignite], [incubator/netbeans], [infrastructure],
            [kafka], [nifi], [openoffice], [pdfbox], [rocketmq], [roller],
            [spark], [tika], [tomcat], [zeppelin]

 In total, as of 1st December, we're tracking 93 (last month: 90)
 open issues across 42 projects, median age 78 (last month: 73)
 days.  53 of those issues have CVE names assigned.

 7 (last month: 5) of these issues, across 6 projects, are older
 than 365 days.

21 Nov 2018 [Mark J. Cox / Isabel]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for October 2018:

  11        [license confusion]
  21        [support request/question not security notification]

  Security reports: 28 (last months: 32, 37, 32)

  3	       [hadoop], [ofbiz], [syncope]
  2	       [httpd], [lucene], [openoffice], [spark]
  1	       [hc], [nifi], [nutch], [oozie], [shindig], [shiro],
           [spamassassin], [subversion], [tapestry], [tomcat], [site]

 In total, as of 1st November, we're tracking 90 (last month: 87)
 open issues across 42 projects, median age 73 (last month: 86)
 days.  57 of those issues have CVE names assigned.

 5 (last month: 4) of these issues, across 4 projects, are older
 than 365 days.

@Phil: draft strongly worded message on board list to PMCs that have outstanding security issues

17 Oct 2018 [Mark J. Cox / Bertrand]

{quote}I would like to propose that we start adding lagging
issues (over 365 days?) to the stats{quote}?

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Clean-up focus is on issues that are more than 90 days old where no
CVE name is yet assigned (therefore still in "investigation" state)
has completed; from 17 issues in August to 2.

Stats for September 2018:

   9        [license confusion]
  15        [support request/question not security notification]

  Security reports: 32 (last months: 37, 32, 39)

  6	        [ofbiz]
  3	        [cloudstack]
  2	        [httpd], [impala], [jmeter]
  1	        [ignite], [incubator/airflow], [incubator/heron], [kafka], [mesos],
            [myfaces], [openoffice], [pdfbox], [poi], [portals], [shiro],
            [sling], [spark], [struts], [tapestry], [tika], [tomcat]

 In total, as of 1st September, we're tracking 87 (last month: 89)
 open issues across 45 projects, median age 86 (last month: 113)
 days.  57 of those issues have CVE names assigned.

 4 (last month: 8) of these issues, across 4 projects, are older
 than 365 days.  We expect to close at least 1 of them this month.

19 Sep 2018 [Mark J. Cox / Roman]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Current clean-up focus is on issues that are more than 90 days old
where no CVE name is yet assigned (therefore still in "investigation"
state).  There are currently 10 of these across 8 projects.

Stats for August 2018:

  13	[license confusion]
  24        [support request/question not security notification]

  Security reports: 37 (last months: 32, 39, 55)

  3	       [couchdb], [httpd], [spamassassin]
  2	       [commons], [nifi], [struts], [tomcat], [trafficserver]

  1	       [accumulo], [activemq], [allura], [fineract], [hive],
           [karaf], [netbeans], [ofbiz], [openoffice], [qpid],
           [ranger], [shiro], [spark], [storm], [subversion],
           [thrift], [zookeeper], [site]

 In total, as of 1st September, we're tracking 89 (last month: 95)
 open issues across 42 projects, median age 113 (last month: 112)
 days.  56 of those issues have CVE names assigned.

 8 (last month: 9) of these issues, across 7 projects, are older
 than 365 days.  We continue to work with these projects to get
 these closed out.

15 Aug 2018 [Mark J. Cox / Mark]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

We have made a change in the way we handle the automated github
dependency security reports.  We will continue to forward them to the
projects but we no longer track and chase them or include them in the
stats.  This is because they were a huge time commitment for little
benefit (none of the issues have led to needed security releases
needed for projects).

Stats for July 2018:

  16	[license confusion]
  12        [support request/question not security notification]

  Security reports: 32 (last months: 39, 55, 54)

  8       [httpd]
  3       [tomcat], [infrastructure]
  2       [spark], [tika]
  1       [ambari], [avro], [axis], [camel], [cayenne], [commons],
          [cordova], [couchdb], [datafu], [db], [dubbo], [hadoop],
          [hive], [jmeter], [logging], [openoffice], [ranger],
          [trafficserver]

 In total, as of 1st August, we're tracking 95 (last month: 113)
 open issues across 42 projects, median age 112 (last month: 92)
 days.  59 of those issues have CVE names assigned.

 9 (last month: 10) of these issues, across 8 projects, are older
 than 365 days.  We continue to work with these projects to get
 these closed out.

18 Jul 2018 [Mark J. Cox / Roman]

Continued work on incoming security issues, keeping projects reminded
of outstanding issues, and general oversight and advice.

Stats for June 2018:

 13	[license confusion]
 8	        [support request/question not security notification]

 Security reports: 39 (last months: 55, 54, 47)

 3	       [httpd]
 3	       [ignite]

 2	       [griffin],[lucene],[qpid],[struts],[tomcat]

 1        [aurora],[bval],[commons],[cxf],[directory]
          [fineract],[geode],[gulp],[hadoop],[hive],[kafka]
          [metron],[nifi],[ofbiz],[openwhisk],[pdfbox]
          [poi],[sling],[spark],[storm],[trafficserver]
          [uima],[zookeeper]

20 Jun 2018 [Mark J. Cox / Bertrand]

Continued work on incoming security issues and helping projects clean
up the backlog of old issues and outstanding CVE names.  Signifcant
co-ordination work happened in April and May based on the "Zip Slip"
flaws reported by Snyk that were reported in more than a dozen ASF
projects.  In most cases these were not found to be security
vulnerabilities, and the affected code was fixed or removed.

Stats for May 2018:

 6	        [license confusion]
 21	[support request/question not security notification]

 Security reports: 55 (last months: 54, 47, 40)

 5	       [tomcat]
 4	       [hadoop]
 3        [httpd]
 3        [nifi]

 2	       [hbase], [ignite], [mesos], [spark], [tika]

 1	       [activemq], [apex], [beam], [bigtop], [cassandra],
          [gobblin], [guacamole], [hive], [incubator/heron],
          [incubator/superset], [incubator/systemml], [infrastructure],
          [jackrabbit], [jmeter], [kafka], [lucene], [metron],
          [openoffice], [orc], [qpid], [reef], [sentry], [spamassassin],
          [storm], [struts], [tapestry], [trafficserver], [xerces],
          [xmlgraphics], [yetus]

16 May 2018 [Mark J. Cox / Bertrand]

Continued work on incoming security issues and helping projects clean
up the backlog of old issues and outstanding CVE names.

Stats for April 2018:

 17	[license confusion]
 11	[support request/question not security notification]

 Security reports: 54 (last months: 47, 40)

 6	       [httpd]
 3	       [storm]
 3	       [struts]
 2	       [geode]
 2	       [guacamole]
 2	       [hadoop]
 2	       [openoffice]
 2	       [tika]
 2	       [tomcat]
 2	       [zeppelin]
 1	       [accumulo],[activemq],[airavata],[ambari],[ant],[apex]
 	       [bookkeeper],[camel],[cloudstack],[commons],[cordova]
          [couchdb],[directory],[hive],[incubator/dubbo],[incubator/pulsar]
          [incubator/taverna],[incubator/weex],[infrastructure]
          [kylin],[maven],[metron],[nifi],[ofbiz],[spark],[thrift]
          [trafficserver],[zookeeper]

@Roman: start discussion with members on how to deal with unaddressed security vulnerabilities

18 Apr 2018 [Mark J. Cox / Isabel]

Continued work on incoming security issues and helping projects clean
up the backlog of old issues and outstanding CVE names.

Stats for March 2018:

 5       [license confusion]
 21      [support request/question not security notification]

 Security reports: 47 (last month 40)

 4       [activemq]
 3       [nifi]
 3       [httpd]
 2       [cloudstack]
 2       [commons]
 2       [hadoop]
 2       [openoffice]
 2       [zeppelin]
 2       [infrastructure(site)]
 1 each  [airavata],[atlas],[bookkeeper],[couchdb],[fineract],[guacamole],
         [helix],[hive],[incubator/dubbo],[incubator/ripple],[incubator/skywalking],
         [jmeter],[mynewt],[openmeetings],[qpid],[spamassassin],[struts],[syncope]
         [taverna],[tika],[tomcat],[trafficserver],[vcl],[wicket]

21 Mar 2018 [Mark J. Cox / Ted]

Continued work on incoming security issues and helping projects clean
up the backlog of old issues and outstanding CVE names.  Meanwhile we
continue being responsive to new security@ emails, with all issues
recently handled by next working day (and most within hours).

* 2018-03-01 there were 117 open issues across 58 projects with median
 ages 84 days (2018-02-01 there were 142 open issues across 59
 projects with median age 89 days).  (Around a dozen are github
 dependancies that mostly will have no security consequence)

* 2018-03-01 there are only 3 CVE not yet in Mitre CVE database from
 before Apache became a CNA in 2017.  This is down from 133 when we
 started the cleanup on 2017-05-09.

Stats for February 2018.

     10      [license confusion]
     9       [support request/question not security notification]

     Security reports: 40

     3        [hadoop]
     3        [openoffice]
     2        [hive]
     2        [lucene]
     2        [ofbiz]
     2        [spamassassin]
     2        [tomcat]
     2        [struts]
     1 each   [allura],[ambari],[beam],[brooklyn],[camel],[derby]
              [geode],[guacamole],[incubator/hawq],[incubator/superset]
              [infrastructure],[juddi],[kafka],[knox],[nifi],[portals]
              [ranger],[spark],[synapse],[thrift],[xerces],[zeppelin]

21 Feb 2018 [Mark J. Cox / Phil]

The new system for handling incoming issues implemented in January is
working very well.  This, along with extra time commitment from
security team members every day. has led to all incoming issues being
dispatched within 24 hours (and often much less).  In the past it
could take a day or two, and the occasional issue would get mislaid
and could weeks.  We've implemented automated scripts for tracking
metrics and therefore stats of the number of issues for months of both
December and January are included this time.

* As of 2018-02-01 there were 142 open issues across 59 projects with
 median age 89 days.   (From 185 issues, 61 projects, 134 days
 on 2018-01-01).  We continue to work on the older issues, many
 of which were released but never completed fully, or non-issues
 that were not closed correctly.

Stats for January 2018.

     10      [license confusion]
     9       [support request/question not security notification]

     Security reports: 66

     4       [httpd]
     3       [hive]
     3       [couchdb]
     3       [tomcat]
     3       [infrastructure]
     2       [incubator/taverna]
     2       [geode]
     2       [lucene]
     2       [ambari]
     2       [cordova]
     2       [openoffice]
     2       [qpid]
     2       [sling]
     2       [spamassassin]
     2       [struts]
     1 each  [allura],[ant],[axis],[bookkeeper],[camel],[cloudstack]
             [commons],[datafu],[eagle],,[fineract],[flink],[hadoop]
             [incubator/skywalking],[incubator/spot],[kafka],[livy]
             [mesos],[metron],[myriad],[ode],[predictionio],[samza]
             [storm],[tomee],[vcl],[weex],[whimsy],[ws],[xerces],[yetus]

(Note there is a slight spike in incoming issues as we include the new
github automated notifications -- although most of these are benign and
closed quickly)

Stats for December 2017.

     11      [support request/question not security notification]
     7       [license confusion]
     1       [confused why our web sites have open directories, source code etc]

     Security reports: 38

     5       [httpd]
     4       [incubator/airflow]
     2       [hadoop]
     2       [openoffice]
     2       [struts]
     1 each  [activemq],[deltaspike],[flink],[fluo],[groovy],[ignite]
             [incubator/mxnet],[jackrabbit],[kudo],[mina],[ofbiz]
             [openmeetings],[qpid],[ranger],[sling],[synapse],[tomcat]
             [trafficserver],[weex],[whimsy],[wicket],[yarn],[zeppelin]

17 Jan 2018 [Mark J. Cox / Brett]

At the end of 2017 we switched to using a shared gmail account for
handling security@apache mail with use of labels to track issues.
This has already started to have a positive effect stopping the
handlers duplicating effort and allowing us to better track issues
that still need actions.

The metrics I usually include in the board report are a by-product of
a monthly walkthrough of the mailbox to spot any missed issues.  The
new handling system does not require this monthly walkthrough and so
there are no stats this month.  However we're working on scripts to
reinstate this, as well as provide more useful stats for board
oversight.

One of these reports we can now automatically create is an aging
report showing the number of outstanding security issues per project
and how long they have been open:

*       As of 2008-01-01 there were 185 open security issues across
 61 projects with median age 134 days

This metric is created automatically and each of the issues has not
been checked for accuracy.  We're working our way through these in the
coming weeks to determine the state and then our future board reports
can highlight projects where we have concerns (i.e. with large numbers
of open issues or generally unresponsive).

20 Dec 2017 [Mark J. Cox / Jim]

Stats for November 2017:

15 CVEs issued to projects (some may not be public yet).

e-mails to security@

7  Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
2  Support Questions

13    Direct Vulnerability report to security@apache.org
   2 [commons]
   1 [activemq]
   1 [synapse]
   1 [drill]
   1 [zeppelin]
   1 [continuum]
   1 [hadoop]
   1 [geronimo]
   1 [oozie]
   1 [httpd]
   1 [drill]
   1 [site] rejected

11   Vulnerabilities reported to projects
   1 [sling]
   1 [qpid]
   2 [httpd]
   2 [struts]
   1 [hadoop]
   2 [tomcat]
   1 [guacamole]
   1 [hive]

15 Nov 2017 [Mark J. Cox / Phil]

This month we had a researcher incorrectly report an issue in
Solr/lucene by sending it not just to security@apache.org but also to
public mailing lists.  CVE-2017-12629.  This information included an
exploit and spread rapidly.  Updates from the project to mitigate this
were produced rapidly and we worked with Press to ensure we had a
media response.

Stats for October 2017:

11 CVEs issued to projects (some may not be public yet).

e-mails to security@

7  Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
5    Support Questions

13    Direct Vulnerability report to security@apache.org
  5 [ignite]
  1 [jmeter/activemq]
  1 [james]
  2 [solr]
  1 [httpd]
  2 [site] 1 rejected
  1 [commons]

10   Vulnerabilities reported to projects
  1 [hive]
  1 [nifi]
  2 [couchdb]
  3 [geode]
  1 [cloudstack]
  1 [aurora]
  1 [tomcat]

18 Oct 2017 [Mark J. Cox / Rich]

Various statements around Struts issues this month for press and for
https://blogs.apache.org/foundation/entry/responses-to-questions-from-us
and the security@struts list gained a lot of requests for clarifications
around various public issues.

Stats for September 2017:

13 CVEs issued to projects (some may not be public yet).

e-mails to security@

3   Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
2    Support Questions

9    Direct Vulnerability report to security@apache.org
  3 [httpd]
  1 [apr]
  1 [commons]
  1 [karaf]
  1 [spark]
  1 [zookeeper]
  1 [tomcat]

21   Vulnerabilities reported to projects
  14 [tomcat] (many the same already public issue, many others rejected)
  4 [struts]
  1 [nifi]
  1 [aoo]
  1 [hive]

20 Sep 2017 [Mark J. Cox / Phil]

We've started an audit of the various security@[tlp] lists to ensure that only
active project members and PMC members are subscribed.

Stats for August 2017:

7 CVEs issued to projects (some may not be public yet).

e-mails to security@

5    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
4    Support Questions

13    Direct Vulnerability report to security@apache.org
  1 [httpd]
  1 [zepplin]
  2 [mesos]
  1 [apr/subversion]
  1 [batik]
  2 [airflow]
  2 [site] rejected
  1 [opennlp]
  1 [xerces]
  1 [drill]

7   Vulnerabilities reported to projects
  1 [httpd]
  2 [kafka]
  1 [cloudstack]
  1 [zookeeper]
  1 [nifi]
  1 [hadoop]

16 Aug 2017 [Mark J. Cox / Bertrand]

Stats for July 2017:

We contacted Mitre to start working on the CVE backlog (where a CVE
was assigned but the information is not yet available on the Mitre
site).  Part of the backlog (where issues were public before Oct 2016)
relies on Mitre writing up the description.  The rest depends on our
projects filling in the missing information, and we started contacting
projects to get them to do that.  We'll give metrics on how that is
going in future reports.

11 CVEs issued to projects (some may not be public yet).

e-mails to security@

7    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
6    Support Questions

6    Direct Vulnerability report to security@apache.org
   1 [site] rejected
   1 [ambari]
   1 [httpd]
   1 [solr]
   1 [tomcat]
   1 [camel]

14   Vulnerabilities reported to projects
  1 [cloudstack]
  1 [spark]
  4 [geode]
  1 [httpd]
  2 [struts]
  1 [couchdb]
  1 [kafka]
  1 [nifi]
  1 [zookeeper]
  1 [hadoop]

19 Jul 2017 [Mark J. Cox / Mark]

Stats for June 2017:

12 CVEs issued to projects (some may not be public yet).

e-mails to security@

1     Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses

11    Direct Vulnerability report to security@apache.org
 1 [site] rejected
 1 [ignite]
 1 [apr]
 2 [ranger]
 1 [zeppelin]
 1 [ambari]
 1 [commons]
 1 [axis2] rejected
 1 [httpd]
 1 [hadoop]

7    Vulnerabilities reported to projects
 3 [httpd]
 1 [couchdb]
 1 [kafka]
 1 [struts]
 1 [couchdb]

21 Jun 2017 [Mark J. Cox / Shane]

Stats for May 2017:

16 CVEs issued to projects (some may not be public yet).

e-mails to security@

7    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses

7    Direct Vulnerability report to security@apache.org
 2 [site] rejected
 1 [cordova]
 2 [solr]
 2 [httpd] (1 rejected)

8    Vulnerabilities reported to projects
 6 [openmeetings]
 1 [trafficserver]
 1 [trafficcontrol]

17 May 2017 [Mark J. Cox / Rich]

Now Apache is a CVE Candidate Naming Authority we're starting to clear
up old CVE names which were given to various TLP over the last 9 years
and that are either public and not yet at cve.mitre.org, or are not
public due to various reasons (still in progress, rejected, etc).

Stats for April 2017:

7 CVEs issued to projects (some may not be public yet).

e-mails to security@

6    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
2    Support question

8    Direct Vulnerability report to security@apache.org
  2 [fineract]
  1 [cayenne]
  1 [site]
  1 [logging]
  1 [tika]
  1 [thrift]
  1 [openmeetings]

10    Vulnerabilities reported to projects
  5 [cloudstack]
  3 [tomcat]
  1 [trafficcontrol]
  1 [hadoop]

19 Apr 2017 [Mark J. Cox / Shane]

Stats for March 2017:

11 CVEs issued to projects (some may not be public yet).

e-mails to security@

12    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
1     Support question

10    Direct Vulnerability report to security@apache.org
  3 [poi]
  1 [infrastucture]
  1 [deltacloud]
  1 [struts]
  1 [axis]
  1 [logging]
  1 [ambari]
  1 [cxf]

13    Vulnerabilities reported to projects
  1 [hive]
  1 [httpd]
  1 [stark]
  1 [cloudstack]
  3 [struts] (+many more asking if RCE affected 1.x)
  2 [tomcat]
  3 [openoffice]
  1 [impala]

15 Mar 2017 [Mark J. Cox / Shane]

Stats for Feb 2017:

8 CVEs issued to projects (some may not be public yet).

e-mails to security@

2    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
2    Support question

10    Direct Vulnerability report to security@apache.org

   3 [site] (3 rejected)
   1 [httpd]
   1 [hbase] (rejected)
   1 [ranger]
   1 [flex]
   1 [struts]
   1 [camel]
   1 [karaf]

9     Vulnerabilities reported to projects

   1 [ambari]
   1 [httpd] (rejected, was PHP)
   1 [zookeeper]
   2 [tomcat]
   1 [brooklyn]
   1 [apex]
   1 [struts]
   1 [ofbiz]

27 Feb 2017 [Mark J. Cox / Shane]

Stats for January 2016:

10 CVEs issued to projects (some may not be public yet).

e-mails to security@

8    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
2    Support question

10    Direct Vulnerability report to security@apache.org

3      [httpd] (1 rejected)
2      [ambari]
1      [archiva]
1      [activemq]
1      [cordova]
1      [axis] (rejected)
1      [lucene]

4     Vulnerabilities reported to projects

2      [struts] (1 rejected)
1      [httpd] (already fixed)
1      [couchdb]

18 Jan 2017 [Mark J. Cox / Bertrand]

Stats for December 2016:

5 CVEs issued to projects (some may not be public yet).

e-mails to security@

8    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
1    Security vulnerability question, but not a vulnerability report

13    Direct Vulnerability report to security@apache.org

1     [brooklyn]
1     [camel]
1     [openmeetings]
1     [couchdb]
1     [lucene]
1     [ant]
1     [apr]
1     [tomee]
1     [camel]
2     [site] rejected
1     [httpd]
1     [cxf]

8     Vulnerabilities reported to projects

1      [struts]
4      [httpd]
1      [nifi]
1      [hadoop]
1      [ofbiz]

21 Dec 2016 [Mark J. Cox / Jim]

The team is still trying to followup on issues reported via security@
to projects that do not seem to have been dealt with.  While in many
cases this leads to action (or formally closing an issue), there are
still some without action which we will raise to the board in due
course.  We're hoping to find better automated methods of tracking and
reporting on these.

Stats for November 2016:

5 CVEs issued to projects (some may not be public yet).

e-mails to security@

4    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
1    Security vulnerability question, but not a vulnerability report
2    Support question

9    Direct Vulnerability report to security@apache.org

1      [ambari]
1      [lucene]
1      [httpd]
1      [xmlgraphics]
1      [karaf] no response to reporter, OP disclosed after 7 days
1      [site] rejected
1      [axis]
1      [cxf]
1      [commons]

5     Vulnerabilities reported to projects

1      [hadoop]
1      [struts]
2      [httpd]
1      [tomcat]

16 Nov 2016 [Mark J. Cox / Bertrand]

The team is still trying to followup on issues reported via security@
to projects that do not seem to have been dealt with.  While in many
cases this leads to action (or formally closing an issue), there are
still some without action which we will raise to the board in due
course.  We're hoping to find better automated methods of tracking and
reporting on these.

Stats for October 2016:

2 CVEs issued to projects (some may not be public yet).

e-mails to security@

15    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to "Apache" mentioned in OSS licenses
1     Security vulnerability question, but not a vulnerability report
2     Support question

1     Direct Vulnerability report to security@apache.org

1     [site]

7     Vulnerabilities reported to projects

1     [zookeeper]
1     [tomcat]
2     [hadoop]
2     [aoo]
1     [cloudstack]

19 Oct 2016 [Mark J. Cox / Chris]

Stats for September 2016:

x11 CVEs issued to projects (some may not be public yet).

e-mails to security@

6      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses
2      Security vulnerability question, but not a vulnerability report
2      Support question

3    Direct Vulnerability report to security@apache.org

1     [commons]
1     [axis]
1     [groovy]

4    Vulnerabilities reported to projects

1     [zookeeper]
1     [hadoop]
1     [httpd]
1     [activemq]

21 Sep 2016 [Mark J. Cox / Shane]

In August the Apache Security Team became an official Mitre Candidate
Naming Authority (CNA).  Previously we were giving blocks of CVE names
to use by Red Hat on request.  Now we have our own block of CVE names
direct from Mitre and are known as the official source when anyone
asks for a CVE name for any non-public vulnerability in any ASF
project.  (This change has minimal process or operational impact at
this time, it also was never obvious where the block came from or the
relationship with Red Hat, so we don't intend any public-visible
commentary about this change).

Stats for August 2016:

11 CVEs issued to projects (some may not be public yet).

e-mails to security@

9      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses
4      Security vulnerability question, but not a vulnerability report

9    Direct Vulnerability report to security@apache.org

1    [thrift]
4    [site] (rejected)
1    [jackrabbit]
1    [cordova]
1    [brooklyn]
1    [httpd]

7    Vulnerabilities reported to projects

2      [httpd]
1      [struts]
1      [tomcat]
1      [hadoop]
1      [sling]
1      [trafficserver]

17 Aug 2016 [Mark J. Cox / Bertrand]

Stats for July 2016:

10 CVEs issued to projects (some may not be public yet).

e-mails to security@

7      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

12    Direct Vulnerability report to security@apache.org

1      [httpd] (httpoxy)
1      [ofbiz]
1      [wicket]
1      [tika]
1      [axis]
1      [myfaces]
3      [site] (comments.apache.org valid issue addressed, 1 rejected, 1 open)
1      [ranger]
1      [blazeds]

13    Vulnerabilities reported to projects

3      [httpd]
3      [tomcat]
3      [openoffice]
1      [struts]
1      [hadoop]
1      [sling]
1      [hadoop]

20 Jul 2016 [Mark J. Cox / Mark]

Currently Apache allocates CVE names from a pool of names given to us
by Red Hat, with Red Hat being the offical Candidate Naming Authority
(CNA).  We approached Mitre some years ago with a view to becoming our
own CNA so we get our own blocks of names.  We've kickstarted this
process again and hope to conclude it by the next report.

Stats for June 2016:

14 CVEs issued to projects (some may not be public yet).

e-mails to security@

8      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

10    Direct Vulnerability report to security@apache.org

1     [httpd] (rejected)
2     [site] (rejected)
1     [qpid]
1     [ofbiz]
1     [cxf]
1     [solr]
1     [poi]
1     [directory]
1     [various] (rejected)

18    Vulnerabilities reported to projects

2     [httpd]
8     [struts] (some rejected)
1     [hadoop]
3     [tomcat] (all rejected)
2     [openoffice]
1     [cloudstack]
1     [cordova]

15 Jun 2016 [Mark J. Cox / Mark]

Following from the discussion from Mark Thomas at last board mtg we
discussed a plan for handling of security issues that are repeatedly
ignored by a PMC (determined by history of dealing with the PMC/issue
severity/issue history).  We will draft a mail ready to be sent to the
issue reporter which outlines the steps we made to contact the PMC and
our suggested next action (usually that the reporter posts the details
of the issue public in some forum such as the oss-security list).
That draft will be sent to the PMC as our final attempt to get the PMC
to respond and work with the reporter, and after some further period
of inactivity will be sent to the reporter and recorded in the next
board report.

Stats for May 2016:

10 CVEs issued to projects (some may not be public yet).

e-mails to security@

3      Support questions
2      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

12    Direct Vulnerability report to security@apache.org

1     [juddi]
1     [comdev]
2     [site] rejected
1     [ranger]
1     [qpid]
1     [axis]
1     [wicket]
1     [flex]
1     [openmeetings]
1     [oozie]
1     [archiva]

1    Vulnerabilities reported to projects

1     [commons]

18 May 2016 [Mark J. Cox / Bertrand]

Stats for Apr 2016:

9 CVEs issued to projects (some may not be public yet).

e-mails to security@

3      Support questions
3      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

9    Direct Vulnerability report to security@apache.org

3     [site] rejected
1     [santuario]
1     [tika]
1     [continuum]
1     [trafficserver]
1     [myfaces]
1     [activemq]

7    Vulnerabilities reported to projects

4     [struts]
1     [aoo]
2     [ambari]

20 Apr 2016 [Mark J. Cox / Brett]

A little progress has been made reviewing historical reports. We have now
gone back as far as mid-March 2015. The current intention is to continue
back into 2014 but how far back will be determined by the rate at which
overlooked issues are uncovered.

The security team has been evaluating https://srcclr.com/. While it is an
improvement on similar tools and has enabled a handful of projects to
indentify vulnerable dependencies, it currently lacks the features required
for it to be useful without being overly burdensome at the ASF. These
features are expected to be made available shortly at which point the
security team will re-evaluate.

The security team is currently tracking 72 open issues. Not all of these
have been confirmed as valid and it is likely some will be rejected.

Some TLPs have failed to respond to vulnerability reports and/or
requests from the security team for updates.

Stats for Mar 2016:

15 CVEs issued to projects (some may not be public yet).

Just over 1000 e-mails to security@

2      Support questions
6      Questions about published security vulnerabilities
3      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

11    Direct Vulnerability report to security@apache.org
1      [activemq]
1      [cocoon]
1      [commons]
1      [httpd]
1      [jspwiki]
1      [mina]
1      [openmeetings]
1      [qpid]
1      [shiro]
1      [tomcat]
1      [tomee]

14    Vulnerabilities reported to projects
1      [apex]
1      [cloudstack]
1      [hadoop]
5      [httpd]
5      [struts]
1      [trafficserver]

@Jim: follow up with APR

16 Mar 2016 [Mark J. Cox / David]

The team continues to answer requests to security@ and redirect
as appropriate.

For Feb 2016:

3     Security vulnerability question, but not a vulnerability report
3     Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

7     Direct Vulnerability report to security@apache.org
 2     [site] (both addressed)
 1     [tomcat]
 1     [commons]
 1     [jackrabbit]
 1     [xerces]
 1     [httpd]

6     Vulnerabilities reported to projects
 1     [sentry]
 1     [struts]
 2     [commons]
 1     [openoffice]
 1     [couchdb]

Greg: How is the review of old reports/follow-through going?

Mark: The exercise is proving to be useful. I intend to keep working back through the archive for as long as it continues to be useful. So far I've gone back a year.

17 Feb 2016 [Mark J. Cox / Rich]

The team continues following up on older reports direct to security@
and ensuring they have been handled by the respective PMCs.

Stats for Jan 2016:

2     Support question
2     Security vulnerability question, but not a vulnerability report
8     Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

9     Direct Vulnerability report to security@apache.org
 2     [xerces]
 1     [site]
 1     [cordova]
 2     [commons]
 1     [jetspeed]
 1     [httpd]
 1     [activemq]

7     Vulnerabilities reported to projects
 1     [httpd]
 3     [tomcat]
 2     [aoo]
 1     [sling]

20 Jan 2016 [Mark J. Cox / Chris]

Given recent issues with some teams neglecting security reports, the
team has started going back over older reports and ensuring they have
been handled by the respective PMCs.  One issue affecting Ranger
Policy Admin server was allocated CVE-2015-5167 but after 5 months our
requests to private@ranger.incubator.apache.org for updates have not
been responded to.  Raising this for board attention.

Stats for Dec 2015:

2     Support question
11    Phishing/spam/proxy/attacks point to site "powered by Apache" or Confused
 user due to Android licenses

3     Direct Vulnerability report to security@apache.org
 3     [affecting web sites]

15    Vulnerabilities reported to projects
 1     [cloudstack, via security@cloudstack]
 6     [tomcat, via security@tomcat]
 3     [httpd, via security@httpd] (one not ASF issue)
 1     [aoo site, via security@openoffice]
 2     [aoo, via officesecurity@lists.freedesktop.org]
 2     [aoo, via security@openoffice]

16 Dec 2015 [Mark J. Cox / Brett]

Apologies for lack of report last month and late report this time, due
to a process issue (the trigger to commit the report used to be the
"Is Now Due" mail which have not been received in recent months).
However, there were no significant issues to report.

Given recent issues with some teams ignoring security reports, the
team has started going back over older reports and ensuring they have
been handled by the respective PMCs.

Stats for Oct 2015:

1     Support question
3     Security vulnerability question, but not a vulnerability report
7     Phishing/spam/proxy/attacks point to site "powered by Apache" or Confused user due to Android licenses
1     vulnerability report [httpd, via security@]
2     vulnerability report [tomcat, via security@tomcat]
1     vulnerability report [flex, via security@]
1     vulnerability report [hadoop, via security@hadoop]

Stats for Nov 2015:

3     Support question
2     Security vulnerability question, but not a vulnerability report
13    Phishing/spam/proxy/attacks point to site "powered by Apache" or Confused user due to Android licenses
1     vulnerability report [hadoop, via security@hadoop]
1     vulnerability report [jetty, via security@]
1     vulnerability report [infra, via security@] not an issue
1     vulnerability report [beanutils, via security@]
5     vulnerability reports [httpd, via security@] none are issues
1     vulnerability report [sling, via security@]
1     vulnerability report[hadoop, via security@]
1     vulnerability report [ofbiz, via secuirty@]
1     vulnerability report [php, via security@] redirected to PHP project

18 Nov 2015 [Mark J. Cox]

A report was expected, but not received

21 Oct 2015 [Mark J. Cox / Greg]

Some concern last month due to non-response of TomEE to a security
issue we passed to the PMC list on 21st May 2015 which had no response
or ack to date.  Please can board remind TomEE PMC of their need to
follow the security process in a timely manner.

Short stats for September 2015, a very quiet month in which we
received:

6     Support question
3     Security vulnerability question, but not a vulnerability report
10    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

Vulnerability reports to security@apache.org:

1     [httpd] (rejected, bug only)

16 Sep 2015 [Mark Cox / Chris]

Short stats for August 2015, we received:

1 Support question
9 Phishing/spam/proxy/attacks point to site
 "powered by Apache" or Confused user due to Android licenses

Vulnerability reports to security@apache.org:

1     [tomcat] closed, user error
1     [ambari]
2     [httpd]

Vulnerability reports direct to projects:

1     [aoo, via officesecurity@freedesktop]
2     [struts, via security@stuts]
1     [sentry, via security@sentry]

19 Aug 2015 [Mark Cox / David]

Short stats for July, we received:

2 Security vulnerability question, but not a vulnerability report
9 Phishing/spam/proxy/attacks point to site
 "powered by Apache" or Confused user due to Android licenses

Vulnerability reports:

1     [cloudstack, via security@cloudstack]
1     [couchdb, via security@couchdb]
1     [struts, via security@struts]
1     [hive, via security@hive]

1     [commons, via security@ and direct]
1     [httpd, via security@]
1     [thrift, via security@]
1     [trafficserver, via security@]
1     [blaze, via security@]
1     [apr, via security@]
1     [groovy via security@]
1     [alurra, via security@]

15 Jul 2015 [Mark Cox / Bertrand]

Yann Ylavic joined security committee.  Short stats for June.  We
received:

 3 Support question
20 Phishing/spam/proxy/attacks point to site
   "powered by Apache" or Confused user due to Android licenses

Vulnerability reports:

2     [struts, via security@struts] (1 rejected)
2     [notus, via security@] redirected to php
2     [httpd, via security@httpd] 1 rejected
2     [aoo, via officesecurity@lists.freedesktop.org]
1     [aoo, via security@] rejected
1     [ambari, via security@]
1     [poi, via security@]
1     [hadoop, via security@hadoop]
1     [xalan, via security@]
1     [camel, via security@]
1     [site, via security@] rejected
1     [directory, via security@]
1     [sling, via security@sling]
1     [groovy, via security@]
1     [activemq, via security@]

17 Jun 2015 [Mark Cox / Chris]

Short stats for May.  We receive:

1      Support question
6      Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

Vulnerability reports:

3     [httpd, via security@] (1 rejected)
1     [axis, via security@]
1     [site, via security@] rejected
1     [jackrabbit, via security@]
1     [activemq, via security@]
1     [various, via security@]
1     [tomee, via security@]

1     [hive, via security@hive] rejected
1     [struts, via security@struts]

20 May 2015 [Mark Cox / Bertrand]

Quick stats for April:

1     Support question
18    Phishing/spam/proxy/attacks point to site "powered by Apache" or
 Confused user due to Android licenses

Vulnerability reports:

1     [httpd, via security@httpd]
1     [struts, via security@struts]
2     [cordova, via private@cordova]
1     [httpd, via security@httpd]
2     [site, via security@] server-status again rejected
1     [cordova, via security@]

It was noticed that Axis PMC have not responded to all the security
issues forwarded to them, and those that have were not correctly cc'd
to security@.  We would suggest the board remind Axis PMC of the
responsibility in handling external security vulnerability
notifications.

It was noticed that there was an issue with communication with Xerces
PMC, this was found to be partially due to the failure to moderate
messages to private@.  No board action required.

In the past month the Apache Tomcat project became aware of two
instances where embargoed Tomcat security vulnerability information
was accidentally published by Red Hat. After discussions with Red Hat,
the Tomcat team are confident that both publications had the same root
cause; that procedures have been put in place by Red Hat to prevent
similar errors occurring again; and that no further action is
required.

22 Apr 2015 [Mark Cox / Brett]

There continues to be a steady stream of reports of various kinds
arriving at security@. These continue to be dealt with by the security
team.

March 2015

3 Support Question
5 Confused user probably due to Android licenses
11 Vulnerability reports to security@apache.org
 3 [site] rejected
 2 [httpd]
 1 [solr]
 1 [camel]
 1 [ambari]
 1 [activemq]
 1 [flex]
 1 [cordova]
5 Vulnerability reports to projects own security lists
 1 [sling]
 1 [hive]
 1 [httpd]
 1 [struts]
 1 [tomcat] rejected

18 Mar 2015 [Mark Cox / Brett]

There continues to be a steady stream of reports of various kinds
arriving at security@. These continue to be dealt with by the security
team.

http://apache.org/security/committers.html updated to explain CVE name
progress

February 2015

3 Confused user probably due to Android licenses

7 Vulnerability reports to security@apache.org
 2 [xerces]
 1 [wink]
 1 [trafficserver]
 1 [ant]
 1 [httpd]
 1 [commons]

4 Vulnerability reports to projects own security lists
 1 [svn]
 1 [cloudstack]
 1 [aoo]
 1 [sling]

18 Feb 2015 [Mark Cox / Doug]

There continues to be a steady stream of reports of various kinds
arriving at security@. These continue to be dealt with by the security
team.

January 2015

2 Support question
2 Security vulnerability question, but not a vulnerability report
6 Confused user probably due to Android licenses

8 Vulnerability reports to security@apache.org
 2 [tomcat] (1 rejected)
 1 [xerces]
 1 [site] rejected
 1 [cassandra]
 1 [batik]
 1 [httpd]
 1 [roller]

4 Vulnerability reports to projects own security lists
 1 [hadoop]
 2 [tomcat]
 1 [struts]

21 Jan 2015 [Mark Cox / Chris]

We see a number of confused messages come to security@ every week
where people say they have been hacked, or they never installed our
software.  These were different to what happened in previous years
when people saw "powered by Apache" on a web page that was in outage
and thought we'd hacked them.

In December we emailed a number of these people (we usually ignore
them) to try to figure out what they were seeing.  Only one responsed
to me, and we figured out that what they saw was a license page for
"Guava" on their Android mobile.  The Guava license mentions it's
under the Apache License.  The user didn't know what Guava was, didn't
remember installing it (they didn't), and assumed that whatever other
things were happening on their handset was the result of this
software.

Aside from these; there continues to be a steady stream of reports of
various kinds arriving at security@. These continue to be dealt with
by the security team.

December 2014

2 Support questions
5 Phishing/spam/proxy/attacks point to site "powered by Apache" or Android
 license bundle

8 Vulnerability reports to security@apache.org
      2 [httpd]
      2 [site] rejected
      1 [cxf]
      1 [camel/dozer]
      1 [qpid]
      1 [xerces]

3 Vulnerability reports to projects own security lists
      1 [oo]
      2 [tomcat] (1 rejected)

17 Dec 2014 [Mark Cox / Rich]

There continues to be a steady stream of reports of various kinds
arriving at security@. These continue to be dealt with by the security
team.

November 2014

1 Security vulnerability question, but not a vulnerability report

6 Vulnerability reports to security@apache.org
 2 [httpd]
 1 [site] rejected
 1 [xerces]
 1 [trafficserver]
 1 [tomcat]

7 Vulnerability reports to projects own security lists
 2 [struts]
 2 [oo]
 1 [couchdb]
 1 [cloudstack]
 1 [spamassassin]

19 Nov 2014 [Mark Cox / Chris]

September 2014

3 Support question
1 Security vulnerability question, but not a vulnerability report

11 Vulnerability reports to security@apache.org
 3 [tomcat] (1 invalid)
 2 [site] rejected
 1 [cordova]
 1 [httpd] rejected
 1 [james]
 1 [activemq]
 1 [solr]
 1 [qpid]

8 Vulnerability reports to projects own security lists
 3 [cloudstack]
 2 [oo]
 1 [trafficserver]
 1 [hadoop]
 1 [hive]

15 Oct 2014 [Mark Cox / Greg]

Apologies for lack of report last month; I used to trigger the commit
on receiving the 2nd reminder.

There continues to be a steady stream of reports of various kinds
arriving at security@. These continue to be dealt with by the security
team.

Some press and researchers believed there was a new Apache worm, but
it wasn't:
http://bighacks.net/chroot-apch0day-apache-exploit-explained/

The Bash vulnerabilities CVE-2014-6271(etc) are being actively
exploited via Apache httpd, most commonly where sites have CGI scripts
written in Bash.  (The exploit conditions does limit the number of
affected servers)

August 2014

1 Support question
4 Security vulnerability question, but not a vulnerability report

11 Vulnerability reports to security@apache.org
 7 [website] (5 invalid)
 1 [activemq]
 1 [axis]
 1 [hadoop]
 1 [httpd]

5 Vulnerability reports to projects own security lists
 1 [openoffice]
 1 [tomcat]
 1 [cloudstack]
 1 [poi]
 1 [svn]

September 2014

2 Support question
2 Security vulnerability question, but not a vulnerability report

9 Vulnerability reports to security@apache.org
 2 [httpd] (1 invalid)
 1 [commons]
 1 [website] (invalid)
 1 [camel]
 1 [spark]
 1 [ambari]
 1 [subversion]
 1 [spamassassin] (invalid)

5 Vulnerability reports to projects own security lists
 1 [struts] (invalid)
 1 [openoffice]
 1 [tomcat]
 1 [hadoop]
 1 [sling] (rejected)

17 Sep 2014 [Mark Cox]

A report was expected, but not received

20 Aug 2014 [Mark Cox / Rich]

There continues to be a steady stream of reports of various kinds
arriving at security@ in July. These continue to be dealt with by
the security team.

July 2014

1 Support question
1 Phishing/spam/proxy/attacks point to site "powered by Apache"


11 Vulnerability reports to security@apache.org
 3 [website] (closed, invalid)
 2 [trafficserver]
 2 [httpd]
 1 [hc]
 1 [solr/poi/tika]
 1 [axis]
 1 [activemq]

6 Vulnerability reports to projects own security lists
 2 [tomcat]
 1 [subversion]
 1 [sling]
 1 [struts]
 1 [openoffice]

16 Jul 2014 [Mark Cox / Chris]

There continues to be a steady stream of reports of various kinds
arriving at security@ in April. These continue to be dealt with by
the security team.  Apologies for lack of update last month due to
a missed reminder.  You'll notice a trend for reports against the
Apache website which are so far all false positives caused by
people who run third party scanning tools and don't bother to
interpret the results (for example reporting that you can access
a directory listing).  These also included reports that www.apache.org
had a public server status page, which although deliberate for many
years, we asked infrastructure to remove (and is now done).

May 2014

13 Vulnerability reports to security@apache.org
 8 [website] (all 8 closed, invalid)
 1 [karaf]
 1 [axis] (rejected)
 1 [commons]
 1 [httpd]
 1 [trafficserver]

6 Vulnerability reports to projects own security lists
 2 [tomcat]
 1 [couchdb]
 1 [hive]
 1 [hadoop]
 1 [struts]

June 2014

8 Support question
3 Phishing/spam/proxy/attacks point to site "powered by Apache"
11 Vulnerability reports to security@apache.org
 8 [website] (8 closed, invalid)
 1 [shindig] (closed, invalid)
 1 [ofbiz]
 1 [cordova]

6 Vulnerability reports to projects own security lists
 3 [tomcat]
 1 [struts] (closed, not issue)
 1 [cloudstack]
 1 [httpd]

18 Jun 2014 [Mark Cox]

A report was expected, but not received

21 May 2014 [Mark Cox / Roy]

There continues to be a steady stream of reports of various kinds
arriving at security@ in April. These continue to be dealt with by
the security team.

April 2014

1 Support question
2 Phishing/spam/proxy/attacks point to site "powered by Apache"
2 Security vulnerability question, but not a vulnerability report

9 Vulnerability reports to security@apache.org
 3 [website] (3 closed, invalid)
 1 [axis]
 1 [maven] (closed, invalid)
 1 [httpd]
 1 [solr]
 1 [poi]
 1 [struts]

9 Vulnerability reports to projects own security lists
 6 [struts] (1 closed, not issue)
 1 [cloudstack]
 1 [hadoop] (closed, invalid)
 1 [tomcat]

16 Apr 2014 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds
arriving at security@ in March. These continue to be dealt with by
the security team.

March 2014

1 Support question
2 Phishing/spam/proxy/attacks point to site "powered by Apache"

8 Vulnerability reports to security@apache.org
 1 [traffic-server]
 3 [website] (closed, not issue)
 2 [httpd] (closed, not issue)
 1 [couchdb] (complete)
 1 [syncope] (in progress)

4 Vulnerability reports to projects own security lists
 2 [hadoop]
 1 [geronimo]
 1 [httpd]

19 Mar 2014 [Mark Cox / Shane]

There continues to be a steady stream of reports of various kinds
arriving at security@ in Feb. These continue to be dealt with by
the security team.

Feb 2014

3 Support question
1 Security vulnerability question, but not a vulnerability report
11 Vulnerability reports to security@apache.org
 1 [traffic server]
 1 [logging]
 1 [poi]
 1 [archiva]
 3 [httpd]
 2 [cordova]
 1 [cxf]
 1 [tomcat]

4 Vulnerability reports to projects own security lists
 1 [sling]
 1 [struts]
 2 [tomcat]

19 Feb 2014 [Mark Cox / Brett]

There continues to be a steady stream of reports of various kinds
arriving at security@ in Jan. These continue to be dealt with by
the security team.

Some effort was made this month to start to chase some old issues
which we forwarded to projects but were there was no visible progress.
One of these was escalated to the board after the reporter had no
response for 6 months (the discussion was ongoing at the time of this
report, but in general the difficulty is where a PMC does not have
complete technical coverage of the project, in these cases we should
make sure the PMC build a separate security team of the folks who can
handle issues.  This is in no way an ASF-only issue, we see exactly
the same problems with other upstreams including Linux kernel etc.)

Jan 2014

1 Security vulnerability question, but not a vulnerability report
4 Phishing/spam/proxy/attacks point to site "powered by Apache"
5 Vulnerability reports to security@apache.org
 1 [cordova]
 1 [directory]
 1 [roller]
 1 [archiva]
 1 [shiro]
10 Vulnerability reports to projects own security lists
 2 [tomcat]
 2 [camel]
 2 [struts]
 1 [cloudstack]
 2 [aoo]
 1 [hadoop]

15 Jan 2014 [Mark Cox / Chris]

There continues to be a steady stream of reports of various kinds
arriving at security@ in Nov/Dec. These continue to be dealt with by
the security team.

Nov 2013

4  Support question
1  Security vulnerability question, but not a vulnerability report
1  Phishing/spam/attacks point to site "powered by Apache"
19 Vulnerability Reports
 1 [axis, via security@apache.org]
 1 [hadoop, via security@hadoop]
 1 [sling, via security@sling]
 1 [tomcat, via security@tomcat]
 15 [cloudstack, via security@cloudstack]

Dec 2013

3  Support question
1  Security vulnerability question, but not a vulnerability report
9  Phishing/spam/proxy/attacks point to site "powered by Apache"
8  Vulnerability reports
 1 [tomcat, via security@tomcat]
 1 [site, via security@]
 2 [httpd, via security@]
 1 [cordova, via security@]
 2 [commons, via security@]
 1 [roller, via security@]

18 Dec 2013 [Mark Cox]

A report was expected, but not received

20 Nov 2013 [Mark Cox / Jim]

There continues to be a steady stream of reports of various kinds
arriving at security@ in October. These continue to be dealt with by
the security team.

1 Support question
5 Security vulnerability question, but not a vulnerability report
2 Phishing/spam/attacks point to site "powered by Apache"
9 Vulnerability Reports
 1 [httpd, via security@]

 1 [aoo, via security@openoffice]
 1 [cloudstack, via security@cloudstack]
 4 [tomcat, via security@tomcat]
 2 [hadoop, via security@hadoop]

Microsoft, Facebook, and others launched a program offering a bug
bounty for flaws found in Apache httpd, https://hackerone.com/ibb
designed to run without interaction or endorsement by the ASF, but
we'll report how that actually works out in future months.

16 Oct 2013 [Mark Cox / Shane]

There continues to be a steady stream of reports of various kinds
arriving at security@, a large number of reports in October. These
continue to be dealt with by the security team.

2 Support question
2 Security vulnerability question, but not a vulnerability report
1 Phishing/spam/attacks point to site "powered by Apache"
14 Vulnerability Reports
 4 [httpd, via security@]
 1 [tomee, via security@]
 3 [struts, via security@]
 1 [xbean, via security@]
 1 [camel, via security@]
 1 [wink, via security@]
 2 [struts, via security@struts]
 1 [sling, via security@sling]

18 Sep 2013 [Mark Cox / Shane]

There continues to be a steady stream of reports of various kinds
arriving at security@, a large number of reports in August. These
continue to be dealt with by the security team.

3 Support question
3 Security vulnerability question, but not a vulnerability report
1 Phishing/spam/attacks point to site "powered by Apache"
19 Vulnerability Reports
 1 [struts, via security@]
 4 [httpd, via security@]
 1 [shindig, via security@]
 1 [tomcat, via security@]
 1 [xalan-j, via security@]
 1 [hadoop, via security@hadoop]
 3 [struts, via security@struts]
 2 [tomcat, via security@tomcat]
 3 [cloudstack, via security@cloudstack]
 1 [sling, via security@sling]
 1 [svn, via security@subversion]

21 Aug 2013 [Mark Cox / Greg]

There continues to be a steady stream of reports of
various kinds arriving at security@. These continue to be dealt with
by the security team.

1 Support question
1 Security vulnerability question, but not a vulnerability report
4 Phishing/spam/attacks point to site "powered by Apache"
7 Vulnerability reports
 3 [struts, via security@struts]
 1 [infrastructure, via security@]
 1 [sling, via security@sling] CVE-2013-2254
 1 [roller, via security@]
 1 [jackrabbit, via security@]

17 Jul 2013 [Mark Cox / Bertrand]

There continues to be a steady stream of reports of
various kinds arriving at security@. These continue to be dealt with
by the security team.

3 Support question
2 Phishing/spam/attacks point to site "powered by Apache"
15 Vulnerability reports
2 [aoo, via officesecurity@lists.freedesktop.org] [1 closed]
1 [sling, via security@sling]
2 [httpd, via security@] [CLOSED]
1 [cloudstack, via security@cloudstack]
1 [hadoop, via security@hadoop]
1 [archiva, via security@]
1 [various, via security@] [CLOSED]
2 [ofbiz, via security@]
1 [tomcat, via security@]
1 tomcat, commons via security@] [CLOSED]
1 [hbase, via security@hadoop, private@hbase]
1 [struts, via security@struts]

19 Jun 2013 [Mark Cox / Bertrand]

For May 2013: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

7      Support question
5      Phishing/spam/attacks point to site "powered by Apache"
9      Vulnerability reports
 2 [httpd, via security@] [1 CLOSED]
 3 [struts, via security@struts] [1 CVE-2013-2115 CLOSED]
 1 [xerces-j, via security@] [CLOSED]
 1 [aoo, via officesecurity@lists.freedesktop.org]
 1 [solr, via security@] [CLOSED]
 1 [cloudstack, via security@cloudstack]

15 May 2013 [Mark Cox / Greg]

For Apr 2013: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

5      Support question
1      Security vulnerability question, but not a vulnerability report
5      Phishing/spam/attacks point to site "powered by Apache"
12     Vulnerability reports
 1 [cloudstack, via private@cloudstack and security@]
 2 [tomcat, via security@tomcat] [CLOSED]
 1 [tomee, via security@]
 1 [ofbiz, via security@]
 1 [ACS, via security@ and private@cloudstack]
 2 [httpd, via security@] [1 CLOSED]
 1 [Santuario, via security@]
 1 [struts, via security@struts]
 1 [xerces-j2, via security@]
 1 [tapestry, via security@]

17 Apr 2013 [Mark Cox / Roy]

For Mar 2013: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

5      Support question
4      Phishing/spam/attacks point to site "powered by Apache"
9      Vulnerability reports
 1 [rave, via security@httpd] [CLOSED, CVE-2013-1814]
 2 [ActiveMQ, via security@] [CLOSED]
 1 [axis, via security@]
 1 [tomcat, via security@]
 1 [qpid, via security@ and private@qpid]
 1 [httpd, via security@]
 1 [subversion, via security@ and private@subversion]
 1 [openoffice, via officesecurity@lists.freedesktop.org]

20 Mar 2013 [Mark Cox / Sam]

For Feb 2013: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

3      Support question
1      Security vulnerability question, but not a vulnerability report
6      Vulnerability reports
 1 [httpd, via security@httpd]
 1 [subversion, via security@] [CLOSING]
 1 [geronimo, via security@geronimo] [CLOSING]
 1 [httpd, via security@] [CLOSED, not security]
 1 [infrastructure, via security@] [CLOSED, not security]
 1 [tomcat, via security@]

20 Feb 2013 [Mark Cox / Greg]

For Jan 2013: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

3      Support question
2      User was hacked, but it wasn't ASF software at fault
7      Vulnerability reports
 1 [directory, via security@apache.org] [CLOSED, not an issue]
 1 [ofbiz, via security@apache.org] [CLOSED, dev version only]
 1 [httpd, via security@apache.org] [CLOSED, not httpd]
 1 [httpd, via security@apache.org] [STALLED, waiting for reporter]
 1 [tomcat, via security@apache.org] [CLOSED, not an issue]
 1 [tomcat, via security@tomcat.apache.org] [CLOSED, not an issue]
 1 [maven, via security@apache.org]

Since the new year we have started a weekly review of open issues to
try to catch situations where the security team have not forwarded
reports correctly or where the project has not responded to the
reporter.

16 Jan 2013 [Mark Cox / Brett]

For Dec 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

4      Support question
1      Security vulnerability question, but not a vulnerability report
2      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability reports
  2 [httpd, via security@apache.org]
  1 [tomcat, via security@tomcat.apache.org]
  1 [commons, via security@apache.org]
  1 [openoffice, via security@openoffice.apache.org]
  1 [not asf project, via security@apache.org]

For the calendar year 2012 as a whole we saw

27    Support questions (31 in 2011)
18    Security vulnerability question, but not a vulnerability report
  (19 in 2011)
18    Phishing/spam/attacks point to site "powered by Apache" (15 in 2011)
0     User was hacked, but it wasn't ASF software at fault (0 in 2011)
78    Vulnerability reports  (60 in 2011)
 38 of which came in to security@apache.org, the others direct
   to projects
 25 projects got vulnerability reports, top 4 accounted for majority:
      21% httpd
      15% tomcat
      11% openoffice
      10% hadoop

Note that not all vulnerability reports are valid or lead to a
security fix being issued; we do not track this (resource intensive to
capture).  However in 2012 we managed to annoy several reporters by
failing to respond to their reports in a reasonable time; this is
because our process [http://apache.org/security/committers.html]
relies on the project following up with the reporter and the security
team does not track if this has been done.  Given the relatively low
number of real reports, for 2013 we'll try some approaches to better
close the loop.

19 Dec 2012 [Mark Cox / Rich]

For Nov 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1      Phishing/spam/attacks point to site "powered by Apache"
3      Vulnerability reports
 1 [cloudstack, via security@apache.org]
 1 [trafficserver, via security@apache.org]
 1 [commons, via security@apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

21 Nov 2012 [Mark Cox / Ross]

For Oct 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

2      Support question
1      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
10     Vulnerability report
 3 [httpd, 2 via security@httpd.apache.org, 1 via security@apache.org]
 2 [tomcat, via security@tomcat.apache.org]
 2 [hadoop, via security@hadoop.apache.org]
 1 [struts, via security@struts.apache.org]
 1 [cloudstack, via security@apache.org] CVE-2012-4501
 1 [cordova, via security@apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

17 Oct 2012 [Mark Cox / Bertrand]

For Sept 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

4      Support question
1      Security vulnerability question, but not a vulnerability report
4      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability report
 2 [tomcat, via security@tomcat.apache.org]
 1 [solr, via security@apache.org]
 3 [hadoop, via security@hadoop.apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

19 Sep 2012 [Mark Cox / Jim]

For August 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1     Support question
3      Security vulnerability question, but not a vulnerability report
9     Vulnerability reports of which:
 1 [axis, via security@apache.org]
 3 [httpd, via security@apache.org]
 1 [james, via root@apache.org]
 1 [ofbiz, via security@apache.org]
 1 [tapestry, via security@apache.org]
 1 [infrastructure, via security@apache.org]
 1 [ooo, via ooo-security@incubator.apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

15 Aug 2012 [Mark Cox / Greg]

For July 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1     Support question
1     Phishing/spam/attacks point to site "powered by Apache"
5     Vulnerability reports of which:
 2 [tomcat, via security@tomacat.apache.org]
 1 [rave, via security@tomcat.apache.org]
 1 [batik/fop, via security@apache.org]
 1 [libcloud, via security@apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

25 Jul 2012 [Mark Cox / Greg]

For June 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

2     Support question
2     Security vulnerability question, but not a vulnerability report
1     Phishing/spam/attacks point to site "powered by Apache"
8     Vulnerability reports of which:
 1 [tomcat, via security@tomcat.apache.org]
 1 [apacheds, via security@apache.org] (already resolved in latest)
 1 [tomcat, via security@tomcat.apache.org] (not an issue)
 1 [struts, via security@struts,apache.org]
 1 [sling, via security@sling.apache.org]
 3 [infrastructure, via security@apache.org]
   all 3 reported that apache.org/server-status was public (deliberate)

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

20 Jun 2012 [Mark Cox / Jim]

For May 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

2      Support question
3      Phishing/spam/attacks point to site "powered by Apache"
5      Vulnerability reports, of which:
 3  [aoo, via officesecurity@lists.freedesktop.org]
 1  [httpd, via security@apache.org]
 1  [hadoop, via security@hadoop.apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

16 May 2012 [Mark Cox / Doug]

For April 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1      Support question
2      Phishing/spam/attacks point to site "powered by Apache"
9      Vulnerability reports, of which:
 2  [httpd, via security@apache.org]
 2  [aoo, via officesecurity@lists.freedesktop.org]
 2  [sling, via security@sling.apache.org]
 1  [roller, via security@apache.org]
 1  [tomcat, via security@apache.org]
 1  [commons, via security@apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

18 Apr 2012 [Mark Cox / Jim]

For March 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

2      Security vulnerability question, but not a vulnerability report
7      Vulnerability reports, of which:
 1  [tomcat, via security@apache.org]
 1  [ds, via security@apache.org]
 2  [hadoop, via security@hadoop.apache.org]
 1  [httpd, via security@apache.org]
 1  [aoo, via officesecurity@lists.freedesktop.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

21 Mar 2012 [Mark Cox / Sam]

For February 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

5      Support question
2      Security vulnerability question, but not a vulnerability report
6      Vulnerability reports, of which:
 1  [xerces, via security@apache.org]
 1  [httpd, via security@apache.org]
 2  [stuts, via security@struts.apache.org]
 1  [tomcat, via security@tomcat.apache.org]
 1  [poi, via security@apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

15 Feb 2012 [Mark Cox / Shane]

For January 2012: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

5      Support question
2      Security vulnerability question, but not a vulnerability report
3      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability reports, of which:
 2  [httpd, via security@apache.org]
 1  [ws, via security@apache.org]
 1  [apr, via security@apache.org]
 1  [oo, via oo-security@incubator.apache.org]
 1  [struts, via security@struts.apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

24 Jan 2012 [Mark Cox / Jim]

For December 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

3      Support question
2      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability reports, of which:
 3  [httpd, via security@apache.org]
 1  [httpd, via security@httpd.apache.org]
 1  [oo, via securityteam@openoffice.org and officesecurity@lists.freedesktop.org]
 1  [struts, via security@struts.apache.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

21 Dec 2011 [Mark Cox / Jim]

For November 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

5      Support question
1      Security vulnerability question, but not a vulnerability report
8      Vulnerability reports, of which:
 3  [httpd, via security@apache.org]
 2  [tomcat, via security@tomcat.apache.org]
 1  [tomcat, via security@apache.org]
 1  [myfaces, via security@apache.org]
 1  [oo, via securityteam@openoffice.org]

The Security project performs really two duties, we receive incoming
reports of security vulnerabilities in ASF software, and we help
projects understand and deal with such reported security
vulnerabilities.  These reports come to security@apache.org usually
from parties outside of the ASF.  We keep track of metrics of how many
issues get reported, in what way, along with the number of
non-security reports just to give the board an idea of the magnitude
of external reports and for trending.  Once an issue is passed to the
appropriate PMC we no longer track it, and therefore we can't give
overall summaries of how quickly ASF respond to issues or severity
trending or total vulnerability counts including those issues dealt
with reported direct to a PMC or found by ASF members internal to a
project. Because our interaction with each issue is minor, there isn't
much additional information we can give in our monthly reports.

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

16 Nov 2011 [Mark Cox / Doug]

For October 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

7      Support question
2      Security vulnerability question, but not a vulnerability report
6      Vulnerability reports, of which:
 1  [httpd, via security@httpd.apache.org]
 1  [tomcat, via security@apache.org and geronimo via security@geronimo.apache.org]
 1  [httpd, via security@apache.org]
 2  [oo, via securityteam@openoffice.org]

Reminder: vulnerability handling process explained at
http://apache.org/security/committers.html

It was noted that Larry has an existing action item to discuss security protocol with this PMC. Larry indicated that he will follow up via e-mail.

26 Oct 2011 [Mark Cox / Greg]

For September 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

4     Support question
3     Security vulnerability question, but not a vulnerability report
6     Vulnerability reports, of which:
 3 [httpd, via security@apache.org]
 1 [commons, via security@apache.org]
 2 [struts, via security@struts.apache.org]

21 Sep 2011 [Mark Cox / Doug]

For August 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.  August saw the HTTPD team spend a lot of effort
on CVE-2011-3192 (byterange remote DoS, apache-killer.pl).

2     Support question
2     Security vulnerability question, but not a vulnerability report
2     Phishing/spam/attacks point to site "powered by Apache"
6     Vulnerability reports, of which:
 1     Vulnerability report [tomcat, via security@tomcat.apache.org] [CLOSED]
 1     Vulnerability report [struts, via security@struts.apache.org]
 4     Vulnerability report [httpd, via security@apache.org]

17 Aug 2011 [Mark Cox / Sam]

For July 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1     Support question
3     Phishing/spam/attacks point to site "powered by Apache"
7     Vulnerability reports of which:
 1     Vulnerability report [couchdb, via security@couchdb.apache.org]
 1     Vulnerability report [openoffice, via security@apache.org]
 2     Vulnerability report [tomcat, via security@tomcat.apache.org]
 2     Vulnerability report [httpd, via security@httpd.apache.org]
 1     Vulnerability report [httpcomponents, via security@apache.org]
       [CLOSED]

Note from last board minute question: not all things listed as
"Vulnerability report" turn out to be real vulnerabilities, and if
they are it's usual for the investigation and final fix to take some
time (especially if a low severity issue), so issues are likely to be
progress over the course of several status reports and not closed in
the same month.

20 Jul 2011 [Mark Cox / Doug]

For Jun 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

3      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability reports
 1      [infrastructure, via security@apache.org]
 1      [multiple projects, via security@apache.org]
 3      [tomcat, via security@tomcat.apache.org]
 1      [httpd, via security@apache.org]

15 Jun 2011 [Mark Cox / Geir]

For May 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1      Support question
2      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
2      Vulnerability reports
 1      [continuum, via security@apache.org]
 1      [camel, via security@apache.org]

19 May 2011 [Mark Cox / Noirin]

For April 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

1      Support question
4      Vulnerability reports
 1      [infrastructure, via security@apache.org]
 1      [xerces, via security@apache.org]
 1      [httpd, via security@apache.org] CLOSED, not an issue
 1      [struts, via security@struts.apache.org] CLOSED, no issues

20 Apr 2011 [Mark Cox / Sam]

For March 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

2     Support question
2     Security vulnerability question, but not a vulnerability report
4     Phishing/spam/attacks point to site "powered by Apache"
1     Vulnerability report [tomcat, via security@tomcat.apache.org]

16 Mar 2011 [Mark Cox / Shane]

Apologies for missing report for Feb board, was due to a failed
commit.  Here it is:

For January 2011: There continues to be a steady
stream of reports of various kinds arriving at security@.  These
continue to be dealt with by the security team.

5      Support question
2      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
5      Vulnerability reports of which:
 2      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [mod_perl, via security@apache.org]
 1      Vulnerability report [tomcat, via security@apache.org]
 1      Vulnerability report [tomcat, via security@tomcat.apache.org]

For February 2011: There continues to be a steady stream of reports of
various kinds arriving at security@.  These continue to be dealt with
by the security team.

3      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
5      Vulnerability reports of which:
 2      Vulnerability report [hadoop, via security@hadoop.apache.org]
 1      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [poi, via security@apache.org]
 1      Vulnerability report [struts, via security@struts.apache.org]

16 Feb 2011 [Mark Cox / Roy]

No report was received.

19 Jan 2011 [Mark Cox / Greg]

For December 2010: There continues to be a steady stream of reports
of various kinds arriving at security@.  These continue to
be dealt with by the security team.

7      Support question
1      Security vulnerability question, but not a vulnerability report
3      Vulnerability reports of which:
 1      Vulnerability report [infrastructure, via security@]
 1      Vulnerability report [roller, via security@]
 1      Vulnerability report [httpd, via security@]

Additionally, the Tomcat and HTTPD security pages were updated to expose
the date each issue was reported to the ASF and the date each issue
was public in addition to the date the issue was fixed.  Vulnerability
databases and researchers find this information useful.  Examples:
http://tomcat.apache.org/security-7.html
http://httpd.apache.org/security/vulnerabilities_22.html

15 Dec 2010 [Mark Cox / Roy]

For November 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

2       Phishing/spam/attacks point to site "powered by Apache"
1       Security vulnerability question, but not a vulnerability report
1       User was hacked, but it wasn't ASF software at fault
5       Vulnerability reports of which:
 1       Vulnerability report [tomcat, via security@apache.org]
 2       Vulnerability report [tomcat, via security@tomcat] (one was CVE-2010-4172)
 1       Vulnerability report [struts, via security@struts]
 1       Vulnerability report [httpd, via security@apache]

17 Nov 2010 [Mark Cox / Greg]

For October 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

4      Support question
2      Security vulnerability question, but not a vulnerability report
6      Vulnerability reports of which
 2      Vulnerability report [couchdb, via security@couchdb]
 2      Vulnerability report [tomcat, via security@tomcat]
 1       Vulnerability report [httpd]
 1       Vulnerability report [shiro] CVE-2010-3863 [CLOSED]

20 Oct 2010 [Mark Cox / Sam]

For September 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

2      Support question
2      Security vulnerability question, but not a vulnerability report
3      Vulnerability reports of which
 1      Vulnerability report [subversion, via security@apache.org]
 1      Vulnerability report [libcloud, via security@apache.org]
 1      Vulnerability report [Archiva, via security@apache.org]

22 Sep 2010 [Mark Cox / Noirin]

For August 2010: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with by the security team.

1      Support question
3      Security vulnerability question, but not a vulnerability report
4      Vulnerability reports of which
 2      Vulnerability report [hadoop via security@hadoop.apache.org]
 1      Vulnerability report [jackrabbit, via security@apache.org] (Was normal bug)
 1      Vulnerability report [Traffic Master, via security@apache.org]

18 Aug 2010 [Mark Cox / Shane]

At DefCon a vulnerability in Apache Struts2 (CVE-2010-1870) received a
Pwnie award (http://pwnies.com/winners/) not just because the flaw was
remote and serious, but because of the mishandling by the ASF
("receiving no response from security@struts.apache.org").  This is
not completely correct: although the reporter did have to send his
report to security@struts twice, the second time it was acted on and a
conversation with the reporter took place.  However the vulnerability
is still not fixed in any released update to Struts, and the Security
Team has found it hard to engage the Struts PMC about this and had to
contact individual Struts committers, also without much success.

Once the Struts team are more back from holidays we'll engage them in
a postmortem of this event to improve future vulnerability handling.

'Security Curmudgeon' mentioned that they have a number of issues they
are tracking in osvdb.org for various Apache projects which may have a
security consequence and should get CVE names.  These issues are
mostly all fixed, but just with undisclosed security context.  The
Security Team intend to work on this list, split it by project, and
contact each of the projects to clean this up.  It will take some
time.

For July 2010:

1      Support question
2      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
3      Vulnerability reports of which
 1      Vulnerability report [commons, via security@apache.org]
 1      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [struts, via security@stuts.apache.org]

Shane wonders how to make PMCs aware of how important security is.

Approved by general consent.

21 Jul 2010 [Mark Cox / Jim]

For June 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be triaged by the security team.

2      Support question
3      Security vulnerability question, but not a vulnerability report
6      Vulnerability reports of which:
 2      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [httpd, internal via security@httpd.apache.org]
 1      Vulnerability report [axis, internal via security@apache.org]
 1      Vulnerability report [tomcat, via security@tomcat.apache.org]
 1      Vulnerability report [tomcat, via security@apache.org]

Missing data presumed to be a calendar skew (different starts of month); Jim to verify.

16 Jun 2010 [Mark Cox / Justin]

For May 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be triaged by the security team.

5      Support question
2      Security vulnerability question, but not a vulnerability report
7      Vulnerability reports of which:
 3      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [activemq, via security@apache.org]
 1      Vulnerability report [wss4j, via security@apache.org]
 1      Vulnerability report [tomcat, via security@tomcat.apache.org]
 1      Vulnerability report [struts, via security@stuts.apache.org]

(Note that the above counts vulnerability reports in the month they arrive,
and not if they turn into verified issues later fixed later, hence it's just
a useful volume counter and is not appropriate to include CVE names.)

19 May 2010 [Mark Cox / Shane]

For Apr 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

2      Support question
3      Security vulnerability question, but not a vulnerability report
2      Phishing/spam/attacks point to site "powered by Apache"
4      Vulnerability reports of which:
 2      Vulnerability report [wicket, via security@apache.org]
 2      Vulnerability report [tomcat, via security@tomcat.apache.org]

Jim indicated that it would be nice for reports to have CVEs, if applicable as well as a foundation-wide security page which lists all known/addressed security issues

21 Apr 2010 [Mark Cox / Brian]

For Mar 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

2      Support question
3      Security vulnerability question, but not a vulnerability report
3      Phishing/spam/attacks point to site "powered by Apache"
4      Vulnerability reports of which:
 1      Vulnerability report [httpd, via security@httpd.apache.org]
 1      Vulnerability report [httpd, via security@apache.org]
 1      Vulnerability report [struts, via security@struts.apache.org]
 1      Vulnerability report [tomcat, via security@tomcat.apache.org]

17 Mar 2010 [Mark Cox / Justin]

Apologies, last status report had metrics labelled Dec 2009 but
actually was for Jan 2010.

For Feb 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

4      Support question
1      Phishing/spam/attacks point to site "powered by Apache"
4      Vulnerability reports of which:
 1      Vulnerability report [axis, via security@apache.org]
 1      Vulnerability report [ofbiz, via security@apache.org]
 2      Vulnerability report [httpd, via security@apache.org]

Shane to discuss the idea of a central public repository for all security fixes in order to improve security communications with the general public.

17 Feb 2010 [Mark Cox / Brett]

For January 2010: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

4       Security vulnerability question, but not a vulnerability report
5       Vulnerability reports of which:
 4       Vulnerability report [httpd, via security@apache.org]
 1       Vulnerability report [myfaces, via security@apache.org]

Discussion of the relative merits of meeting-to-meeting vs. calendar based reports. General consensus: as long as each project is consistent, the board is OK.

20 Jan 2010 [Mark Cox / Greg]

For December 2009: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

 2       Support question
 2       Security vulnerability question, but not a vulnerability report
 1       Phishing/spam/attacks point to site "powered by Apache"
 6       Vulnerability report of which
         1       [juddi, via security@apache.org]
         2       [tomcat, via security@tomcat.apache.org]
         3       [httpd, via security@apache.org]

16 Dec 2009 [Mark Cox / Shane]

For November 2009: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

 5       Support question
 2       Security vulnerability question, but not a vulnerability report
 1       Vulnerability report of which
 1       [myfaces, via security@apache.org]

Also in November the TLS renegotiation flaw was made public which
requires protocol updates to be corrected.  While the upstream OpenSSL
fix was to disable all renegotiation that can break sites needing to
use client certificates, and so mod_ssl got an alternative mitigation
fix (http://marc.info/?m=125755783724966 ).  This will continue to be
a painful issue for some months as changes to the protocol and OpenSSL
implementation thereof may break some client/server interactions.

18 Nov 2009 [Mark Cox / Justin]

For October 2009: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

 2       Support question
 4       Security vulnerability question, but not a vulnerability report
 2       Vulnerability report of which
         1       [infrastructure xss, via security@apache.org]
         1       [httpd, via security@apache.org]

21 Oct 2009 [Mark Cox / Jim]

For September 2009: There continues to be a steady stream of reports
of various kinds arriving at security@apache.org.  These continue to
be dealt with by the security team.

2   Support question
3   Security vulnerability question, but not a vulnerability report
5   Vulnerability reports, of which:
 1    Vulnerability report [tomcat, via security@tomcat.apache.org]
 1    Vulnerability report [tomcat, via security@apache.org]
 1    Vulnerability report [portals, via security@apache.org]
 2    Vulnerability report [httpd, via security@apache.org]

23 Sep 2009 [Mark Cox / Brian]

For August 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with by the security team.  This month saw additional load due
to questions about the "Slowloris" httpd exploit.  Due to the
outstanding work of the infrastructure team and their rapid and full
disclosures we did not get questions about the infrastructure
compromise.

1    Support question
6    Security vulnerability question, but not a vulnerability report
3    Phishing/spam/attacks point to site "powered by Apache"
5    Vulnerability reports of which
 1    Vulnerability report [apr, via security@apache.org] CVE-2009-2412
 1    Vulnerability report [httpd, via security@apache.org]
      (not an issue)
 1    Vulnerability report [httpd, via security@httpd.apache.org]
 1    Vulnerability report [tomcat, via security@tomcat.apache.org]
 1    Vulnerability report [tomcat, via security@tomcat.apache.org]
      (not an issue)

19 Aug 2009 [Mark Cox / Greg]

For July 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with by the security team.

5    Support question
4    Security vulnerability question, but not a vulnerability report
3    Vulnerability reports of which
 1 Vulnerability report [httpd, via security@apache.org]
 2 Vulnerability report [infrastructure, via security@apache.org]

15 Jul 2009 [Mark Cox / Doug]

For June 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

2    Support question
7    Security vulnerability question, but not a vulnerability report
2    Phishing/spam/attacks point to site "powered by Apache"
1    Vulnerability report
 of which
   1    Vulnerability report [httpd, via security@apache.org]

This month saw the publication of the Apache httpd "Slowloris" DoS
tool which caused a larger number of public questions to the list
(those questions and discussions were correctly redirected to the
public dev list).  Updated Tomcat and APR-util was also released to
address a number of older security issues.

17 Jun 2009 [Mark Cox / Geir]

For May 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

 1    Support question
 3    Vulnerability report
      of which
        1    Vulnerability report [tomcat, via security@apache.org]
        1    Vulnerability report [httpd, via security@apache.org]
        1    Vulnerability report [xerces, via security@apache.org]

20 May 2009 [Mark Cox / Sam]

For Apr 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

 2    Support question
 5    Vulnerability report
      of which
           1    Vulnerability report [tomcat, via security@apache.org]
           2    Vulnerability report [tomcat, direct]
           1    Vulnerability report [httpd, via security@apache.org]
           1    Vulnerability report [Juddi, via security@apache.org]

Bill to get with Mark to ask what "direct" means.

15 Apr 2009 [Mark Cox / Sam]

For Mar 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

 2    Support question
 3    Phishing/spam/attacks point to site "powered by Apache"
 6    Vulnerability report
      of which
      1    Vulnerability report [httpd, via security@apache.org]
      2    Vulnerability report [tomcat, direct]
      2    Vulnerability report [tomcat, via security@apache.org]
      1    Vulnerability report [mod_perl, via security@apache.org]

18 Mar 2009 [Mark Cox / Justin]

For Feb 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

2     Support question
2     Security vulnerability question, but not a vulnerability report
3     Phishing/spam/attacks point to site "powered by Apache"
1     User was hacked, but it wasn't ASF software at fault
4     Vulnerability report

18 Feb 2009 [Mark Cox / Jim]

For Jan 2009: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

2     Support question
1     Security vulnerability question, but not a vulnerability report
6     Phishing/spam/attacks point to site "powered by Apache"
1     User was hacked, but it wasn't ASF software at fault
8     Vulnerability reports

Also in January the security team page was created to 1) tell users
how to report issues in any ASF project along and 2) give guidance
on how to deal with such reports.   http://www.apache.org/security/

We agreed to collapse the Vulnerability reports in the public minutes going forward, omitting the names of the projects.

21 Jan 2009 [Mark Cox / Henning]

For December 2008: There continues to be a steady stream of reports of
various kinds arriving at security@apache.org.  These continue to be
dealt with promptly by the security team.

6      Support question
2      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
1      Vulnerability report [geronimo, direct to geronimo team]
2      Vulnerability report [tomcat, direct to tomcat team]
2      Vulnerability report [httpd, via security@apache.org]
1      Vulnerability report [roller, via security@apache.org]

Partially to address the large number of support questions, in Jan
2009 Mark Thomas has been working on a ASF top level /security page
which better explains the use of the security@apache.org address and
will hopefully cut down on some of the out-of-scope emails.

17 Dec 2008 [Mark Cox / Bill]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  For Nov 2008:

4       Support question
2       Security vulnerability question, but not a vulnerability report
1       Vulnerability report [spamassassin]

No report received. Bill sent a reminder.

19 Nov 2008 [Mark Cox / Justin]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  For Oct 2008:

1      Support question
3      Security vulnerability question, but not a vulnerability report
2      Phishing/spam/attacks point to site "powered by Apache"
1      User was hacked, but it wasn't ASF software at fault
7      Vulnerability reports across four projects containing a mix of
 verified and unverified issues

15 Oct 2008 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.

Aug 2008

1      Support question
1      Phishing/spam/attacks point to site "powered by Apache"

Sep 2008

Now also including other security@x.apache.org, note again
"vulnerability report" includes things sent to us that turn out to not
be vulnerabilities (it's an indication of response effort)

4      Support question
3      Security vulnerability question, but not a vulnerability report
1      User was hacked, but it wasn't ASF software at fault
3      Vulnerability report [tomcat]
3      Vulnerability report [httpd]

17 Sep 2008 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  Statistics missing for this month and
will be updated for next month including the breakout of issues per
project as requested at the last board meeting.

20 Aug 2008 [Mark Cox / Geir]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  For July 2008:

 1 Support question
 1 Security vulnerability question, but not a vulnerability report
 1 Phishing/spam/attacks point to site "powered by Apache"
 3 Vulnerability report

Note that the statistics given each month are for queries sent to
security@apache.org and does not include any that are sent to specific
project lists advertised separately such as
security@tomcat.apache.org.  Most projects do not advertise separate
lists (or really need to given the low volume of issues affecting most
projects), and the only one which gets really any direct reports is
security@tomcat.  We'd only advise a project advertising a separate
security response address if they get or expect a significant number
of issues.

For these board reports we do not plan on giving more detail about
specific issues unless they are significant in some way (critical
vulnerability or threat) as issues can take several months through the
lifecycle of dealing with the reporter during which time they are
usually non-public.

For interest now we have two years of data, here is the cummulative
total emails to security@apache.org for each type:

           Jul-Dec06 Jan-Jun07 Jul-Dec07 Jan-Jun08 Total
Support     24        14        25        13         [76]
Query       11        10         4        11         [36]
PoweredBy   17        20        19        11         [67]
NotASFHack   7         5         0         3         [15]
Report      24        23        23        20         [90]
Total      [83]      [72]      [71]      [58]       [284]

Support : Support question, not vulnerability related.  We won't
answer these but will refer them to some public list.

Query : Security vulnerability question, but not a vulnerability
report.  We answer some of these but in most cases refer to a public
list for discussion.

PoweredBy : Phishing/spam/attacks point to site "powered by Apache".
We try to help the users understand what happened, but many still
don't believe us, or don't understand.

NotASFHack : User was hacked, but after investigation it turns out it
wasn't ASF software at fault.  Note that there isn't a "WasASFHack"
row because we've not yet heard from anyone whose machine was
compromised where it turned out to be via some flaw (fixed or unfixed)
in ASF software.

Report : What the list is designed for, a vulnerability report.  We
include here all reports of possible vulnerabilities even if they turn
out not to be vulnerabilities (as they require effort to investigate
and/or respond).  It's pretty constant though the years.

Jim request that the projects for which the vulnerability was reported be included in the report

16 Jul 2008 [Mark Cox / Justin]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  Nice and quiet for June:

1      Support question
3      Vulnerability report

It was noted that not all security reports are httpd related. Henning indicated a desire that a breakdown by projects would be nice, but there was no direction to provide it.

25 Jun 2008 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  May 2008 was mostly quiet although
the release of Apache HTTP Server 2.2.9 addressed two minor issues.

1      Support question
2      Security vulnerability question, but not a vulnerability report
1      User was hacked, but it wasn't ASF software at fault
4      Vulnerability report

21 May 2008 [Mark Cox / J. Aaron]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  Apr 2008 was mostly quiet:

1      Support question
6      Phishing/spam/attacks point to site "powered by Apache"
1      Vulnerability report

16 Apr 2008 [Mark Cox / Greg]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Mar 2008:

7      Support question
2      Security vulnerability question, but not a vulnerability report
3      Phishing/spam/attacks point to site "powered by Apache"
6      Vulnerability report

19 Mar 2008 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Feb 2008:

2      Support question
4      Security vulnerability question, but not a vulnerability report
1      Phishing/spam/attacks point to site "powered by Apache"
1      User was hacked, but it wasn't ASF software at fault
3      Vulnerability report

Nothing much to note, although three requests this month to remove
emails from mail-archives.apache.org as the addresses are unobsfucated
and indexed by google.

20 Feb 2008 [Mark Cox / Will]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Jan 2008:

1       Support question
3       Security vulnerability question, but not a vulnerability report
1       Phishing/spam/attacks point to site "powered by Apache"
1       User was hacked, but it wasn't ASF software at fault
3       Vulnerability report

This month the press reported thousands of Apache HTTP on Linux
servers being compromised and used to serve malicious files to visiting
Windows clients.  Although initial reports were sketchy, in the end the
evidence pointed to the machines being compromised through leaked passwords
and not through any ASF or third party software installed.  The Security
Team gave a short press statement which was used in some stories.

Approved by General Consent.

16 Jan 2008 [Mark Cox / Bill]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Dec 2007:

2       Support question
1       Security vulnerability question, but not a vulnerability report
3       Phishing/spam/attacks point to site "powered by Apache"
8       Vulnerability report

For HTTPD Security, this month saw the completion of some
vulnerabilities reported via SecurityReason, but all moderate or low
severity, and finally fixing the security list moderator.

Approved by General Consent.

19 Dec 2007 [Mark Cox / Greg]

This month saw the completion of some vulnerabilities in the HTTPD
project reported via JPCERT although the co-ordination process took a
lot of effort considering the low severity of the issues.

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Nov 2007:

4       Support question
1       Security vulnerability question, but not a vulnerability report
4       Phishing/spam/attacks point to site "powered by Apache"
3       Vulnerability report

Approved by General Consent.

14 Nov 2007 [Mark Cox / Sam]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Oct 2007:

5      Support question
1      Security vulnerability question, but not a vulnerability report
5      Phishing/spam/attacks point to site "powered by Apache"
4      Vulnerability report

Approved by General Consent.

17 Oct 2007 [Mark Cox / Henri]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Sep 2007:

5       Support question
1       Security vulnerability question, but not a vulnerability report
4       Phishing/spam/attacks point to site "powered by Apache"
1       Vulnerability report

After some discussion, it was decided that the current set of security mailing lists and advertisements of such on the ASF web sites as they exist today is adequate and appropriate.

Approved by General Consent.

19 Sep 2007 [Mark Cox / Greg]

Security Team Project chair apologies for lack of August status report.

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For July/Aug 2007 we had 19 non-SPAM new issues:

9       Support question
3       Phishing/spam/attacks point to site "powered by Apache"
7       Vulnerability report

A new set of HTTP Server releases this month fixed a number of
moderate severity security issues, and included a work-around for a
browser vulnerability, CVE-2007-4465.  We also gained access to add
comments directly into the National Vulnerability Database, useful for
adding official statements to disputed issues.

Approved by General Consent.

29 Aug 2007 [Mark Cox / Henri]

Henri is to follow up requesting a report for next month

Approved by General Consent.

18 Jul 2007 [Mark Cox / Geir]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For Jun 2007 we had 10 non-SPAM requests:

5       Security vulnerability question, but not a vulnerability report
5       Phishing/spam/attacks point to site "powered by Apache"
4       Vulnerability report

The board discussed tracking, and we agreed that the role of the committee is to provide advice and to ensure that every issue has an owner.

Approved by General Consent.

20 Jun 2007 [Mark Cox / Aaron]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team.  For May 2007 we had 10 non-SPAM requests:

3       Support question
2       User was hacked, but it wasn't ASF software at fault
2       Phishing/spam/attacks point to site "powered by Apache"
3       Vulnerability report

One of the vulnerability reports was in fact first reported in May 2006,
but was never responded to as the issues were not deemed important.
Whilst we are very responsive for issues of critical severity and issues
that are not vulnerability reports, issues with no or low security impact
have sometimes get lost: we're looking at ways to prevent this.

Approved by General Consent.

16 May 2007 [Mark Cox / Justin]

In April, Mark Thomas continued his audit of security issues fixed in
Tomcat but not documented with CVE names.  Mark Thomas and Joe Orton
were added to the Security Team Project.  There continues to be a
steady stream of reports of various kinds arriving at
security@apache.org. These continue to be dealt with promptly by the
security team.  For April 2007 we had 13 non-SPAM requests:

 46% ( 6) Actual report of a vulnerability (both valid and invalid)
 38% ( 5) User asks support question
  8% ( 1) Phishing/spam/attacks point to site "powered by Apache"
  8% ( 1) Security vulnerability question, but not a vulnerability report

Approved by General Consent.

25 Apr 2007

Update Apache Security Team Membership

 WHEREAS, the Apache Software Foundation (ASF) Board Commmittee,
 known as the Apache Security Team expects to better serve
 its purpose through the periodic update of its membership; and

 WHEREAS, the Apache Security Team is a Board-appointed committee
 whose membership must be approved by Board resolution.

 NOW, THEREFORE, BE IT RESOLVED, that the following ASF
 members be added as Apache Security Team members:

     Joe Orton <jorton@apache.org>
     Mark Thomas <markt@apache.org>

 Special Order 6B, Update Apache Security Team Membership, was
 approved by Unanimous Vote.

25 Apr 2007 [Mark Cox / Ken]

There continues to be a steady stream of reports of various kinds arriving
at security@apache.org. These continue to be dealt with promptly by the
security team. We have a proposed resolution for this board meeting to
expand the security team to include Joe Orton and Mark Thomas, both of
whom have been doing significant security-related work.

Approved by General Consent.

28 Mar 2007 [Mark Cox / Greg]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team. We had some interesting issues where
the vulnerability was in the interaction between two projects.  For
Jan and Feb 2007 we had 28 non-SPAM requests:

 36% (10) Actual report of a vulnerability (both valid and invalid)
 21% ( 6) User asks support question
 21% ( 6) Phishing/spam/attacks point to site "powered by Apache"
 11% ( 3) Security vulnerability question, but not a vulnerability report
 11% ( 3) User was hacked, but it wasn't ASF software at fault

Most serious issue dealt with was a critical severity issue affecting
recent versions of mod_jk where we worked successfully for the first
time with researchers at TippingPoint.

Approved by General Consent.

21 Feb 2007 [Mark Cox / Ken]

[no report received]

Jim noted that he had seen an incoming report that was signed by a key that only BenL could decrypt. He was wondering if the security team had a key that all members could use and whether this one report was sent to BenL directly and not to the security team. Sander indicated that to his recollection, 3 people had the key: BenL, Marc and Lars. This is to be double checked.

Ken requested status on the CA issue and what the current plans/hopes for client certs were.

17 Jan 2007 [Mark Cox / Henri]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  For Oct-Dec 2006 we had 39 non-SPAM
requests out of about 1270 messages that made it through the spamfilter.

 31% (12) User asks support question
 26% (10) Actual report of a vulnerability (both valid and invalid)
 20% ( 8) Phishing/spam/attacks point to site "powered by Apache"
 18% ( 7) Security vulnerability question, but not a vulnerability report
  5% ( 2)  User was hacked, but it wasn't ASF software at fault

Sam noted, with approval, that we are now receiving board reports from the team.

Approved by General Consent.

20 Dec 2006

Update Apache Security Team Membership

 WHEREAS, the Apache Software Foundation (ASF) Board Commmittee,
 known as the Apache Security Team expects to better serve
 its purpose through the periodic update of its membership; and

 WHEREAS, the Apache Security Team is a Board-appointed committee
 whose membership must be approved by Board resolution.

 NOW, THEREFORE, BE IT RESOLVED, that the following ASF
 members be added as Apache Security Team members:

    * Lars Eilebrecht     (lars@apache.org)
    * William A. Rowe     (wrowe@apache.org)
    * Sander Striker      (striker@apache.org)

 Special Order 6A, Updating the Apache Security Team Membership, was
 approved by Unanimous Vote.

25 Oct 2006 [Mark Cox / Cliff]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team.  For July-Sep 2006 we had 44 non-SPAM
requests (out of about 1670 messages that made it through the
spamfilter)

 32% (14) Actual report of a vulnerability (both valid and invalid)
 27% (12) Phishing/spam/attacks point to site "powered by Apache"
 27% (12) User asks support question
 10% ( 4) Security vulnerability question, but not a vulnerability report
  4% ( 2) User was hacked, but it wasn't ASF software at fault

Still outstanding is some requests to fix the committee info and
outreach to some projects to understand how to interface with us.

It was noted that the board should suggest to Mark to work on growing the committee.

Approved by General Consent

20 Sep 2006

Reestablishing the Apache Security Team

  WHEREAS, the Board of Directors deems it to be in the best
  interests of the Foundation and consistent with the
  Foundation's purpose to establish the ASF Board Committee
  charged with maintaining the security of software produced by
  the various projects established under the ASF's umbrella,
  but not for the security of the servers and other
  infrastructure used by the ASF.

  NOW, THEREFORE, BE IT RESOLVED, that the ASF Board Committee,
  known as the "Apache Security Team", be and hereby is
  reestablished pursuant to Bylaws of the Foundation; and be it
  further

  RESOLVED, that the Apache Security Team be and hereby is
  responsible for organization and oversight of efforts to
  maintain the security of ASF projects and shall act as a
  single point of contact between the ASF and any entity
  wishing to report or fix any security related issue in any
  project.

  RESOLVED, that each project shall appoint at least one
  non-voting liaison to the committee, who shall have commit
  privilege for the project's repository, and the technical
  ability to release new versions, advisories or security
  patches on behalf of the project.

  RESOLVED, that the committee shall have the power to act on
  behalf of any project in matters of security.

  RESOLVED, that Mark Cox shall serve at the direction of
  the Board of Directors as the chair of the Security Team and
  have primary responsibility for managing the Security Team;
  and be it further

  RESOLVED, that the persons listed immediately below be and
  hereby are appointed to serve as the members of the Apache
  Security Team:

      Ben Laurie
      Mark Cox

  There was some discussion over the small number of "initial"
  members of the team. It was noted that it was expected that
  new members would be added as soon as the team rebooted.

 Special Order 6A, Reestablishing the Apache Security Team, was
 approved by Unanimous Vote.

19 Jul 2006 [Ben Laurie / Justin]

No report provided

Jim asked when was the last time we had a report and asked if it was time to propose a more active chair? Henri noted that the last report was February 2006 but the board noted that reports were few and sparse. Sander said that he had talked to Ben Laurie and that he has been in touch with Mark J. Cox as a possible candidate to take over.

26 Apr 2006 [Ben Laurie]

There was no report. Sander was tasked with getting a security report.

15 Feb 2006 [Ben Laurie]

There continues to be a steady stream of reports of various kinds
arriving at security@apache.org. These continue to be dealt with
promptly by the security team, most notably Mark Cox. The good news is
that the majority of projects new appear to have security@ addresses
so its possible to have the reports dealt with by the right
people. The bad news is that we continue to not properly track issues,
resulting in them getting dropped on the floor too often.

Approved by General Consent.

6. Special Orders

18 Jan 2006 [Ben Laurie]

There was no report yet again. The board expressed concern that the Security Team consistantly neglects to file reports. Sander was to talk to Ben about this concern.

26 Oct 2005 [Ben Laurie]

Action Item: Sander to track down report

27 Apr 2005 [Ben Laurie]

No report. The board expressed serious concern that no report from the Security Team has been submitted for several times in a row. Greg asked for volunteers to contact Ben Laurie to determine why this is the case. Sander agreed to contact Ben and report back to the board.

19 Jan 2005 [Ben Laurie]

No report submitted. It was noted that the Security Team had not submitted a report for almost a year. Greg indicated he would contact Ben regarding this.

6. Special Orders

20 Oct 2004 [Ben Laurie]

No report was provided. It was agreed that Greg or Dirk would send a polite but firm reminder that these reports are required, and that the Security Team does not have a good track record of providing these reports.

18 Aug 2004 [Ben Laurie]

No report submitted.

21 Jul 2004 [Ben Laurie]

A report was expected, but not received

18 Feb 2004 [Ben Laurie]

As discussed at the last board meeting, there's little to report on
the security team front, except that we continue to deal with incoming
reports by forwarding to the appropriate team, and we continue to not
do a fantastic job with the less critical problems - critical ones are
dealt with promptly, as always, but others are quite often dropped on
the floor until outside forces refocus our attention.

Although I don't see this as an enormous problem, it would be nice to
find a way to fix it. Sadly, with volunteer effort, it is hard to
do. I have idly wondered if it might be a suitable item for corporate
sponsorship (i.e. providing the monitoring/tracking/ass-kicking
function).

It was noted that new PMCs need to be aware of the Security Team and must ensure that they work with the team.

Approved via General Consent.

21 Jan 2004 [Ben Laurie]

No report received or submitted.

22 Jan 2003 [Ben Laurie]

The security team now has its own mailing list
(security-team@apache.org), for discussion of team business and _not_
security issues.

security@apache.org is still the primary contact for security issues,
which are then dispatched to the security list for the appropriate
(sub-)project. These are being set up on a piecemeal basis, as needed
for new security issues, and are of the form
<project>-security@apache.org, security@<project>.apache.org or
<subproject>-security@<project>.apache.org. This diversity is
regrettable, but needed in order to match the list to the correct
audience, without breaking intuitiveness of naming.

security@apache.org is subscribed to _all_ these mailing lists, so the
core security team remain aware of developments.

So far these lists only exist for httpd and Tomcat, but this is
probably a good thing, so we can work out any wrinkles in the plan
without having to modify dozens of lists to conform.

There is also a CVS repository, security, which is used to (manually)
track the status of reports. It is currently proposed to break this
into subdirectories for each (sub-)project, with group access as
appropriate to the subdirectory (which I support, but has not yet had
time for discussion).

I've also unilaterally adopted a numbering scheme for tracking
reports, of the form AST-yyyymmdd(-nn), with no complaints yet heard.

Although it is early days, it seems clear that this system has already
resulted in two clear positive benefits:

a) issues are not getting (permanently) dropped on the floor

b) issues are being dispatched to the project teams and are no longer
 summarily dealt with by the security core team.

. By general consent, this report was recorded as entered and approved.

18 Nov 2002 [Ben Laurie]

Ben reported that things are moving slightly slowly. Currently, the team
is getting the liasons added from each ASF PMC, project and subproject.