Conspiracy theorists have claimed that Microsoft is secretive about bugs in Internet Explorer. Well, you may be interested to know about Mozilla's security policy on bug reporting:
"Security bug reports can be treated as special and handled differently than "normal" bugs. In particular, the mozilla.org Bugzilla system will allow bug reports related to security vulnerabilities to be marked as "Security-Sensitive," and will have special access control features specifically for use with such bug reports."
"Full information about security bugs will be restricted to a known group of people, using the Bugzilla access control restrictions"
"As noted above, information about security bugs can be held confidential for some period of time; there is no pre-determined limit on how long that time period might be."Handling Mozilla Security Bugs
This was criticised by the Computer Emergency Response Team of the University of Stuttgart (RUS-CERT) who finds fault in the fact that no official security advisories are published by the Mozilla Foundation. Instead security leaks are silently patched and incorporated into newer releases. This leaves independent security agencies completely in the dark about the true fragility of Mozilla's browsers.
This security policy could seriously backfire. Consider that other open-source organizations have used early revisions of Mozilla code in their own products, some of which have been used by large populations of end users, many of whom may not often upgrade or check for recent security fixes.
Although Mozilla's policy may lessen exploitation of their latest browser, it risks damaging PR in the long term. To deliberately keep security reports confidential is tempting fate.
But how could Mozilla enforce their policy? I mean, how do you make people report bugs back to you and noone else?
Then I found out about the bounty programme.. cash rewards for secrecy. Mozilla have learnt a lot from communism haven't they!
(10 years ago)
add a photo
last links (total: 7)
|created||link||hits received||interest in site|