Open source vulnerability notification

Authors: Brandon Carlson Kevin Leach Darko Marinov Meiyappan Nagappan Atul Prakash

Venue: Open Source Systems (OSS), pp. 12-23, 2019

Year: 2019

Abstract: The use of third-party libraries to manage software complexity can expose open source software projects to vulnerabilities. However, project owners do not currently have a standard way to enable private disclosure of potential security vulnerabilities. This neglect may be caused in part by having no template to follow for disclosing such vulnerabilities. We analyzed 600 GitHub projects to determine how many projects contained a vulnerable dependency and whether the projects had a process in place to privately communicate security issues. We found that 385 out of 600 open source Java projects contained at least one vulnerable dependency, and only 13 of those 385 projects had a security vulnerability reporting process. That is, 96.6% of the projects with a vulnerability did not have a security notification process in place to allow for private disclosure. In determining whether the projects even had contact information publicly available, we found that 19.8% had no contact information publicly available, let alone a security vulnerability reporting process. We suggest two methods to allow for community members to privately disclose potential security vulnerabilities.

BibTeX:

@inproceedings{brandoncarlson2019osvn,
    author = "Brandon Carlson and Kevin Leach and Darko Marinov and Meiyappan Nagappan and Atul Prakash",
    title = "Open source vulnerability notification",
    year = "2019",
    pages = "12-23",
    booktitle = "IFIP International Conference on Open Source Systems"
}

Plain Text:

Brandon Carlson, Kevin Leach, Darko Marinov, Meiyappan Nagappan, and Atul Prakash, "Open source vulnerability notification," Open Source Systems (OSS), pp. 12-23