Google: Security flaws not fixed in a week should be made public

    Google: Security flaws not fixed in a week should be made public


    Posted: 30 May 2013
    Google is pushing for a new "aggressive" response timeline for security vulnerabilities, where vendors would be given seven days to patch to the flaw, notify the public or disable affected products.

    If researchers find a previously unseen critical flaw that is being used in real-world attacks, they will have Google's blessing to publish details about it seven days after alerting the affected vendor.

    "Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information," Google security engineers Chris Evans and Drew Hintz wrote.
    Read more at source: Google: Security flaws not fixed in a week should be made public | ZDNet
    Brink's Avatar Posted By: Brink
    30 May 2013



  1. Posts : 25,847
    Windows 10 Pro. 64/ version 1709 Windows 7 Pro/64
       #1

    I don't believe that many programs or operating systems can be patched that quickly but I do believe the public could and should be notified of such security flaws that quickly.
    I don't know how to write patches for programs or operating system but I would like to have the information of the flaw asap. Who knows I might be able to disable something for a period of time until the flaw is fixed.
      My Computer


  2. Posts : 9,582
    Windows 8.1 Pro RTM x64
       #2

    Could potentially backfire with disastrous consequences, especially if the vulnerability is a difficult one to patch. If these are made public as Google seems to want them to be if they are not fixed within a week, then malware writers who have previously not targeted the said vulnerability will surely jump on the bandwagon and create more of a problem than existed in the first place (in other words, they might target the flaw from a completely different direction resulting in the solution that the program vendor is working on for the existing malware targeting the flaw prior to it being published by Google not necessarily working for malware targeting it after publication).
      My Computer


  3. Posts : 25,847
    Windows 10 Pro. 64/ version 1709 Windows 7 Pro/64
       #3

    Dwarf you have a very good point.
      My Computer


  4. Posts : 26,869
    Windows 11 Pro
       #4

    I did note that he named Microsoft Windows 7 Pro and Windows 8 have a security flaw that has never been exploited, but then says there is another software vendor who is being actively exploited. I wonder why they named Microsoft, who has not been exploited, but not the company that is being exploited.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 05:49.
Find Us