CERT Stats Under Fire - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

04:08 AM
Connect Directly

CERT Stats Under Fire

The Linux camp objects to the method used by the United States Computer Emergency Readiness Team to count Linux vulnerabilities.

Linux supporters have roundly criticized a recent report from the United States Computer Emergency Readiness Team (CERT), which reported that during 2005, Linux and Unix combined had 2,328 vulnerabilities, compared with 812 vulnerabilities for Microsoft Windows.

Linux practitioners say the counts are skewed because they count the same vulnerability each time it appeared last year in any given Linux distribution. By doing this, they say, one bug could actually show up in the list dozens of times, depending on the number of Linux variants it appeared in. The CERT stats also appear to include problems with scripting languages such as PHP or even applications that are not part of the core Linux operating system but instead are used with it.

Another complaint about the CERT numbers, aside from lumping Unix and Linux into the same bucket, is a behavior specific to the open-source community. There might well be multiple reports for the same bug, says David Humphrey, a senior technology adviser for Ekaru, a Westford, Mass.-based consultancy. In the open-source world, a bug report is issued anytime something is originally discovered, of course, but then at each stage of the fix there is usually another report issued. "When it's worked on and some progress is made, there's another report, and so on," he says. This contrasts with Microsoft's approach, he says, which typically is to report a bug only after it's been resolved, and only once.

“I don't think that you can accurately draw conclusions from the CERT report," says Dave Rosenberg, senior analyst at the Open Source Development Labs, a vendor consortium that helps maintain the core Linux kernel. "This report doesn't provide any beneficial information for CIOs or IT staff making security decisions."

As of press time, CERT spokesmen did not return numerous phone calls seeking comment on the organization's counting methodology. But Alan Paller, director of research at the SANS Institute, defended CERT as having a "rigorous, consistent process. The fault is not with CERT; the fault is that there are so many different distributions of Linux." Still, even he conceded that the CERT statistics are not really usable except as a jumping off point to discuss security issues.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Top 10 Data and Analytics Trends for 2021
Jessica Davis, Senior Editor, Enterprise Apps,  11/13/2020
Where Cloud Spending Might Grow in 2021 and Post-Pandemic
Joao-Pierre S. Ruth, Senior Writer,  11/19/2020
The Ever-Expanding List of C-Level Technology Positions
Cynthia Harvey, Freelance Journalist, InformationWeek,  11/10/2020
Register for InformationWeek Newsletters
Current Issue
Why Chatbots Are So Popular Right Now
In this IT Trend Report, you will learn more about why chatbots are gaining traction within businesses, particularly while a pandemic is impacting the world.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll