首页> 外文会议>IEEE Conference on Software Testing, Validation and Verification >Fixing of Security Vulnerabilities in Open Source Projects: A Case Study of Apache HTTP Server and Apache Tomcat
【24h】

Fixing of Security Vulnerabilities in Open Source Projects: A Case Study of Apache HTTP Server and Apache Tomcat

机译:在开源项目中修复安全漏洞:Apache HTTP服务器和Apache Tomcat的案例研究

获取原文

摘要

Software vulnerabilities are particularly dangerous bugs that may allow an attacker to violate the confidentiality, integrity or availability constraints of a software system. Fixing vulnerabilities soon is of primary importance; besides, it is crucial to release complete patches that do not leave any corner case not covered. In this paper we study the process of vulnerability fixing in Open Source Software. We focus on three dimensions: personal, i.e., who fixes software vulnerabilities; temporal, i.e., how long does it take to release a patch; procedural, i.e., what is the process followed to fix the vulnerability. In the context of our study we analyzed 337 CVE Entries regarding Apache HTTP Server and Apache Tomcat and we manually linked them to the patches written to fix such vulnerabilities and their related commits. The results show that developers who fix software vulnerabilities are much more experienced than the average. Furthermore, we observed that the vulnerabilities are fixed through more than a commit and, surprisingly, that in about 3% of the cases such vulnerabilities show up again in future releases (i.e., they are not actually fixed). In the light of such results, we derived some lessons learned that represent a starting point for future research directions aiming at better supporting developers during the documentation and fixing of vulnerabilities.
机译:软件漏洞是特别危险的错误,可能允许攻击者违反软件系统的机密性,完整性或可用性约束。修复漏洞很快是主要的重要性;此外,释放不覆盖任何角色外壳的完整贴片至关重要。在本文中,我们研究了开源软件中的漏洞修复过程。我们专注于三维:个人,即,谁修复软件漏洞;暂时,即,释放补丁需要多长时间;程序,即,修复漏洞的过程是什么过程。在我们研究的背景下,我们分析了有关Apache HTTP服务器和Apache Tomcat的337 CVE条目,并且我们手动将它们链接到编写的修补程序以修复此类漏洞及其相关的提交。结果表明,修复软件漏洞的开发人员比平均值要多得多。此外,我们观察到漏洞通过超过一个提交而定制,令人惊讶的是,其中大约3%的漏洞在未来的发布中再次出现(即,它们实际上没有固定)。鉴于这样的结果,我们派生了一些经验教训,这代表了未来研究方向的起点,以便在文档和修复漏洞期间更好地支持开发人员。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号