MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery Published in Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering(2024)
Download the Source code(version used in the camrea ready paper):
Download the dataset and patches(to simply restore the dump 2024-09-26):
Paper link: https://dl.acm.org/doi/abs/10.1145/3663533.3664036
Please use following format for citation:
@inproceedings{akhoundali2024morefixes,
title={MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery},
author={Akhoundali, Jafar and Nouri, Sajad Rahim and Rietveld, Kristian and Gadyatskaya, Olga},
booktitle={Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software Engineering},
pages={42--51},
year={2024}
}
Note
Please use the the database dump for now instead of running the whole project, there seems to be some minor issues when running the project.
The tool developed and test on Linux and MacOs. Windows is NOT tested yet. To run it, you'll need python3.10+
, docker
and docker-compose
.
Depending on hardware and due to rate limits(even with API keys), the tool will require several days to complete the processing.
It's highly recommended to use the provided dataset dump instead of running it from scratch. You can load the database dump, and if required, you can run the tool again to get latest results.
If you need to just use the database without running the code, jump to section(Run docker containers).
By default, The tool will try to load the dump file, named postgrescvedumper-2024-09-26.sql
. You can download this file(zipped) from Zenodo: https://zenodo.org/records/13983082
In the database(see docker-compose.yml
). With this, you'll restore the database in a docker container. If you don't want to run the tool, you can simply use the database.
Default user credentials in the dump:
POSTGRES_USER=postgrescvedumper
POSTGRES_DB=postgrescvedumper
POSTGRES_PASSWORD=a42a18537d74c3b7e584c769152c3d
Run docker containers in MoreFixes root path by running sudo docker-compose up -d
In Examples
directory, you can find a jupyter notebook with some examples of how to use the dataset.
You can also find EER information in Doc
directory.
It's highly recommended to first read the MoreFixes paper and understand different tables and their usage, specially the fixes
table. For example, in the fixes
table, you can choose different threshold for score
column increase\decrease the noise. It's also worth to mention that commits with score less than 65 are not included in the following tables: commits
, file_change
, method_change
. However, their metadata(such as hashes) are available in the fixes
table, which allows mining them by decreasing the score
in environment variable and re-running the project.
This tool is consisted of two main components(Morefixes and Prospector) and two data sources(NVD and GSAD)
Caution
You have to configure Prospector as well to make Morefixes work
Make sure you have cloned this repository with submodules.
MoreFixes structure itself is based on CVEFixes project.
Add the Github security advisory database(https://github.com/github/advisory-database) in Code/resources/ghsd
to get latest vulnerabilities list.
Then, create a virtual python environment(recommended) in the repo root directory, and install dependencies:
pip install -r requirements.txt
Renamed env.sample
to .env
and update the fields in .env
and .CVEfixes.ini
in tool root directory,
Note that these values should be same for similar services(for example posgtresql database credentials) related to each other.
Update 'config.yaml' in /prospector
path, and copy the current .env
file to /prospector
directory as well.
Create a separate virtual environment in /prospector
named venv
and install requirements for prospector(pip install -r requirements.txt
).
In the Prospector venv, Run
python -m spacy download en_core_web_sm
python -m spacy download en_core_web_lg
python -m spacy download en
Warning
if the virtual environment directory name is not 'venv', update python executor path in runner.sh
Warning
We are not planning to keep prospector in this repository, this is a temporary workaround.
We HIGHLY recommend to first restore the latest backup, and then run the tool to only processes new advisories. Otherwise,
Deactivate the venv of Prospector and switch to Morefixes venv, then run the tool by executing bash Code/run.sh
. This will first update the GHSA dataset in /Code/resources/advisory-database
and download latest CPE Dictionary from NVD and starts the whole flow mentioned in the figure 1 of the paper.
Please note we don't recommend running it on a low-end device and using the published dataset should be an easier choice if you just need to work with the available data.
One of the heaviest modules of this software, is located at Code/resources/dynamic_commit_collector.py
, which will process possible fix commits in parallel. If you need to run the software from scratch, make sure to double-check parameters in this page to make sure your system won't break during processing.
Please report any issues in the official repository: https://github.com/JafarAkhondali/Morefixes/issues/new