Connect with us

Hi, what are you looking for?



Google Adds OpenVPN, Apache to Patch Rewards Program

Google’s push to ferret out security holes in external products has been expanded to include the OpenVPN and Apache https, two of the most widely deployed open-source programs.

Google’s push to ferret out security holes in external products has been expanded to include the OpenVPN and Apache https, two of the most widely deployed open-source programs.

The addition of the OpenVPN virtual private network and the Apache web server follows Google’s October announcement to shell out cash rewards to hackers who find and responsibly report security vulnerabilities in non-Google products.

Software Security Vulnerability

The company is paying between $500 and $3,133.70, depending on the class and severity of the reported vulnerability.

According to Michal Zalewski from the Google Security Team, security improvements in third-party open-source programs “are vital to the health of the entire Internet.”

In addition to OpenVPN and Apache, Google is expanding the program to include web servers lighttpd and nginx; mail delivery services Sendmail, Postfix, Exim and Dovecot; the open-source components of Android; and several key open-source technologies that handle reliability on the Internet. 

In October, the program launched with a challenge for hackers to find and report flaws in the following projects:

– Core infrastructure network services: OpenSSH, BIND, ISC DHCP

Advertisement. Scroll to continue reading.

– Core infrastructure image parsers: libjpeg, libjpeg-turbo, libpng, giflib

– Open-source foundations of Google Chrome: Chromium, Blink

– Other high-impact libraries: OpenSSL, zlib

– Security-critical, commonly used components of the Linux kernel (including KVM)


Related Reading: Bug Bounty Programs More Cost-Effective Than Hiring Security Experts

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.