Peter Makohon’s Post

View profile for Peter Makohon, graphic

Global Head of Cyber Threat Management at AIG

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a report examining 172 key open-source projects for their susceptibility to memory flaws. This research, conducted in collaboration with the FBI and cybersecurity agencies from Australia and Canada, reveals significant concerns about the use of memory-unsafe code in critical open-source software[1]. Key findings from the report include: 1. 52% of the analyzed critical open-source projects contain code written in memory-unsafe languages[1]. 2. 55% of the total lines of code across these projects are in memory-unsafe languages[1]. 3. Larger projects are disproportionately affected, with the ten largest projects having at least 26% of their code in memory-unsafe languages[1]. 4. The median proportion of memory-unsafe code in large projects is 62.5%, with four projects exceeding 94%[1]. 5. Even projects primarily written in memory-safe languages often depend on components using memory-unsafe code[1]. Notable examples of projects with high percentages of unsafe code include: - Linux (95%) - Tor (93%) - MySQL Server (84%) - glibc (85%) - Redis (85%) - SystemD (65%) - Chromium (51%) - Electron (47%)[1] CISA acknowledges that developers often face challenges that necessitate the use of memory-unsafe languages, particularly for low-level functionalities like networking, cryptography, and operating system functions. Performance requirements and resource constraints are cited as primary factors[1]. To address these issues, CISA recommends: 1. Writing new code in memory-safe languages such as Rust, Java, and Go[1]. 2. Transitioning existing projects, especially critical components, to memory-safe languages[1]. 3. Following safe coding practices[1]. 4. Carefully managing and auditing dependencies[1]. 5. Performing continuous testing, including static analysis, dynamic analysis, and fuzz testing[1]. This report underscores the ongoing challenges in software development and the importance of prioritizing memory safety in critical open-source projects to enhance overall cybersecurity. Citations: [1] https://lnkd.in/gBpinEeJ [2] https://lnkd.in/eu9ZfXZx [3] https://lnkd.in/gV2yyEgA [4] https://lnkd.in/gKqqUgTW [5] https://lnkd.in/g4sEYwqu

CISA: Most critical open source projects not using memory safe code

CISA: Most critical open source projects not using memory safe code

bleepingcomputer.com

To view or add a comment, sign in

Explore topics