Google expands bug bounty program to include open source software

Share this article:
Federal watchdog says SEC security issues put financial data at risk
Federal watchdog says SEC security issues put financial data at risk

Internet technology company Google is adding bugs in open source software (OSS) to its vulnerability reward program, effectively expanding the bug bounty project that has been ongoing since November 2010.

In its initial run, Google will be offering vulnerability rewards ranging from $500 to $3,133.70 for core infrastructure network services, including OpenSSH, BIND, ISC DHCP; and core infrastructure image parsers, including libjpeg, libjpeg-turbo, libpng, giflib, according to a post by Michal Zalewski, a Google security team member.

Bug hunters will also receive vulnerability rewards for open-source foundations of Google Chrome, such as Chromium and Blink; other high-impact libraries, including OpenSSL and zlib; and security-critical and commonly used components of the Linux kernel, including Kernel-based Virtual Machine, according to the Zalewski post.

“So we decided to try something new: provide financial incentives for down-to-earth, proactive improvements that go beyond merely fixing a known security bug,” Zalewski said. “Whether you want to switch to a more secure allocator, to add privilege separation, to clean up a bunch of sketchy calls to strcat(), or even just to enable ASLR  – we want to help!”

In the future, Google is hoping to expand the OSS bug bounty program to web servers, including Apache httpd, lighttpd and nginx; SMTP services, including Sendmail, Postfix and Exim; toolchain security improvements for GCC, binutils and llvm; and OpenVPN, Zalewski said in the post.

“We're excited about this new effort, which complements and extends our long-running vulnerability reward programs for Google web applications and for Google Chrome,” a Google spokesperson told SCMagazine.com on Thursday.

Not everyone is convinced vulnerability reward programs mitigate threats entirely. Aviram Jenik, CEO of vulnerability assessment company Beyond Security, told SCMagazine.com on Thursday that his personal experiences with Google's bug bounty program have been “not stellar.”

“Interesting thought: Anyone who sells a weaponized vulnerability to the highest bidder and does it anonymously could possibly also sell the solution to Google,” Brian Pearce, COO of Beyond Security, told SCMagazine.com on Thursday.

[An earlier version of this story incorrectly stated that Brian Pearce is COO of Beyond Trust].  

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Researchers observe more than a hundred connections to 'Backoff' sinkhole

Researchers with Kaspersky Lab were able to sinkhole two command-and-control servers used by certain Backoff point-of-sale malware samples.

Judge lifts stay but Microsoft won't hand over emails during appeal

A judge has lifted a suspension of a previous order compelling Microsoft to hand over customer emails stored on a server in Ireland.

Home Depot investigates possible payment card breach

Home Depot investigates possible payment card breach

Home Depot said on Tuesday that it is working with its banking partners and law enforcement to investigate a possible data breach.