Discovery of Timeline and Crowd Reaction of Software Vulnerability Disclosures
Reusing third-party libraries increases productivity and saves time and costs for developers. However, the downside is the presence of vulnerabilities in those libraries, which can lead to catastrophic outcomes. For instance, Apache Log4J was found to be vulnerable to remote code execution attacks....
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Reusing third-party libraries increases productivity and saves time and costs
for developers. However, the downside is the presence of vulnerabilities in
those libraries, which can lead to catastrophic outcomes. For instance, Apache
Log4J was found to be vulnerable to remote code execution attacks. A total of
more than 35,000 packages were forced to update their Log4J libraries with the
latest version. Although several studies have been conducted to predict
software vulnerabilities, the prediction does not cover the vulnerabilities
found in third-party libraries. Even if the developers are aware of the
forthcoming issue, replicating a function similar to the libraries would be
time-consuming and labour-intensive. Nevertheless, it is practically reasonable
for software developers to update their third-party libraries (and
dependencies) whenever the software vendors have released a vulnerable-free
version. In this work, our manual study focuses on the real-world practices
(crowd reaction) adopted by software vendors and developer communities when a
vulnerability is disclosed. We manually investigated 312 CVEs and identified
that the primary trend of vulnerability handling is to provide a fix before
publishing an announcement. Otherwise, developers wait an average of 10 days
for a fix if it is unavailable upon the announcement. Additionally, the crowd
reaction is oblivious to the vulnerability severity. In particular, we
identified Oracle as the most vibrant community diligent in releasing fixes.
Their software developers also actively participate in the associated
vulnerability announcements. |
---|---|
DOI: | 10.48550/arxiv.2411.07480 |