An Empirical Study of Security Problem Reports in Linux Distributions

被引:0
|
作者
Anbalagan, Prasanth [1 ]
Vouk, Mladen [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of problem reports, or limit their attention to observations on the number of security problem reports. To evaluate the security of a project, it is necessary to know not only how many security problem reports are logged but also how many are reported and how promptly they are corrected etc. In this paper we study publicly disclosed security problem reports from eight releases of Fedora, nine releases of Ubuntu, four releases of RedHat Enterprise Linux (RHEL) and two releases of Suse Linux distributions, analyse and discuss which type of problem reports and how frequently they are reported, and how promptly they are corrected. Overall, Fedora and Suse show good results with high and medium severity security problem reports resolved without a backlog. On the other hand, RHEL and Ubuntu show less positive results with presence of backlogs.
引用
收藏
页码:482 / 485
页数:4
相关论文
共 50 条
  • [1] Vulnerability management in Linux distributions An empirical study on Debian and Fedora
    Lin, Jiahuei
    Zhang, Haoxiang
    Adams, Bram
    Hassan, Ahmed E.
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (02)
  • [2] Upstream bug management in Linux distributions An empirical study of Debian and Fedora practices
    Lin, Jiahuei
    Zhang, Haoxiang
    Adams, Bram
    Hassan, Ahmed E.
    EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (06)
  • [3] An Empirical Study of Configuration Mismatches in Linux
    El-Sharkawy, Sascha
    Krafczyk, Adam
    Schmid, Klaus
    21ST INTERNATIONAL SYSTEMS & SOFTWARE PRODUCT LINE CONFERENCE (SPLC 2017), VOL 1, 2017, : 19 - 28
  • [4] The Study of Access Mechanism for the Security of Linux
    Wang ChengJiong
    INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS RESEARCH, 2013, 422 : 176 - 180
  • [5] An Empirical Study of Regression Bug Chains in Linux
    Xiao, Guanping
    Zheng, Zheng
    Jiang, Bo
    Sui, Yulei
    IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (02) : 558 - 570
  • [6] Linux Security Modules: General security support for the Linux kernel
    Wright, C
    Cowan, C
    Smalley, S
    Morris, J
    Kroah-Hartman, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 17 - 31
  • [7] Effective IS Security: An Empirical Study
    Straub, Detmar W., Jr.
    INFORMATION SYSTEMS RESEARCH, 1990, 1 (03) : 255 - 276
  • [8] Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study
    Lo, Edward
    He, Ningyu
    Shi, Yuejie
    Xu, Jiajia
    Wu, Chiachih
    Li, Ding
    Guo, Yao
    2023 IEEE SECURITY AND PRIVACY WORKSHOPS, SPW, 2023, : 326 - 336
  • [9] A Measurement Study on Linux Container Security: Attacks and Countermeasures
    Lin, Xin
    Lei, Lingguang
    Wang, Yuewu
    Jing, Jiwu
    Sun, Kun
    Zhou, Quan
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 418 - 429
  • [10] Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel
    Lyu, Yunbo
    Kang, Hong Jin
    Widyasari, Ratnadira
    Lawall, Julia
    Lo, David
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (09) : 2219 - 2239