Linked by Thom Holwerda on Sat 1st Jun 2013 18:43 UTC
Privacy, Security, Encryption Google is changing its disclosure policy for zero-day exploits - both in their own software as in that of others - from 60 days do 7 days. "Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information. As a result, after 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves. By holding ourselves to the same standard, we hope to improve both the state of web security and the coordination of vulnerability management." I support this 100%. It will force notoriously slow-responding companies - let's not mention any names - to be quicker about helping their customers. Google often uncovers vulnerabilities in other people's software (e.g. half of patches fixed on some Microsoft 'patch Tuesdays' are uncovered by Google), so this could have a big impact.
Thread beginning with comment 563506
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[4]: Comment by Nelson
by lucas_maximus on Mon 3rd Jun 2013 11:43 UTC in reply to "RE[3]: Comment by Nelson"
lucas_maximus
Member since:
2009-08-18

A bug is not the same as a critical security vulnerability. If you lump them together, then it's you who has no clue.


Since we are talking about software, most would consider it a software defect which is more commonly known as a bug. Sorry you are being a pedantic dick-piece.

Security vulnerabilities have high priorities and just like bugs are classified Minor, Moderate, Major and Critical.

I've had to patch a few critical security vulnerabilities. The total response time for them ranges 8-72 hours, including QA. A week to patch, or even put out an advisory, is exceptionally generous


But you still have to go through a change management process.

Also you make no mention of whether you actually created the patch, deployed it or the complexity.

i.e. Fixing an SQL injection vunerability is relatively easy compared to something like patching a vunerability in some critical part of the OS.

I can claim to have fixed critical security vunerabilities when all I really did was change a particular procedure to use parameterised queries and a SPROC.

Edited 2013-06-03 11:45 UTC

Reply Parent Score: 3

RE[5]: Comment by Nelson
by cfgr on Mon 3rd Jun 2013 12:29 in reply to "RE[4]: Comment by Nelson"
cfgr Member since:
2009-07-18

Since we are talking about software, most would consider it a software defect which is more commonly known as a bug. Sorry you are being a pedantic dick-piece.


No. A bug would be like a broken design for the car radio. A security vulnerability is like a broken design for the brake system. The former gets fixed at the garage, the latter gets recalled and costs a lot of money to the manufacturer. Ask Toyota how that went, even though ultimately they may not have been at fault.

Also, name calling only decreases any credibility you had left.

Edited 2013-06-03 12:33 UTC

Reply Parent Score: 2

RE[6]: Comment by Nelson
by Nelson on Mon 3rd Jun 2013 13:30 in reply to "RE[5]: Comment by Nelson"
Nelson Member since:
2005-11-29

The classic OSNews pile on. Why am I not surprised. Anyway, the differences are well known, and completely irrelevant.

Its obvious what he meant, and nit picking aside, his point still stands. Where as you and JAlexoid have spent time splitting semantic hairs, none of you have addressed the actual real concerns that he raised.

Reply Parent Score: 3

RE[5]: Comment by Nelson
by JAlexoid on Mon 3rd Jun 2013 13:02 in reply to "RE[4]: Comment by Nelson"
JAlexoid Member since:
2009-05-19

most would consider it a software defect which is more commonly known as a bug

That is - for a fact - not true. Design flaws are not bugs. A lot of security vulnerabilities are and were not bugs, but a perfectly correct implementations of designs and requirements.

Sorry you are being a pedantic dick-piece.

And I just hope that you don't work on any of the software that stores my private information...

Also you make no mention of whether you actually created the patch, deployed it or the complexity.

How about all three steps, on multiple occasions and none of them were SQL injection.
And since when does anyone give a f**k about complexity when it comes to critical vulnerabilities?

Reply Parent Score: 3

RE[6]: Comment by Nelson
by Nelson on Mon 3rd Jun 2013 13:28 in reply to "RE[5]: Comment by Nelson"
Nelson Member since:
2005-11-29


That is - for a fact - not true. Design flaws are not bugs. A lot of security vulnerabilities are and were not bugs, but a perfectly correct implementations of designs and requirements.


The mistake you made is in assuming that you're both talking about the same classification of "bug". He obviously used the word questionably, and you called him out on it. It is though even more obvious that he didn't mean a run of the mill bug or software defect, but a very real showstopping critical vulnerability.

So you going on about the differences between bug and vulnerability is an example of pedantry. Its nice that you know the difference, as I'm sure a lot of us do, but its superfluous to this discussion.



And since when does anyone give a f**k about complexity when it comes to critical vulnerabilities?


Because the implications of patching the vulnerability can extend deeply into the code base and cause other issues down the road, which is why QA processes are necessary, and they don't necessarily have a constant time. More complex code takes longer to evaluate, especially when it runs on an increasingly complicated array of software.

The oversimplification of this entire thing is what I think Lucas is getting at, and its disgusting. People here think that software engineering runs on pixie dust and good feelings. There are actual people working on these projects and it takes actual time to get a fix out of the door in a responsible manner.

Its great that you have had a situation where you got a fix out in a relatively short amount of time, but I hardly think that your experience is one that is necessarily universal.

Reply Parent Score: 3