A CISA analysis in collaboration with international partners concluded most critical open source projects potentially contain memory safety vulnerabilities

  • mozz@mbin.grits.dev
    link
    fedilink
    arrow-up
    9
    ·
    3 days ago

    The fuck are you on about

    The headline is not what the article says at all

    written in a memory-unsafe language

    The report concluded that most critical open source projects potentially contain memory safety vulnerabilities. This is a result of direct use of memory unsafe languages or external dependency on projects that use memory-unsafe languages.

    Emphasis on “potentially” is mine

    Quite a lot more than 55% of projects have an external dependency on projects that use memory unsafe languages. Aside from a certain amount of Go or Rust projects that manage to avoid any dependency that drops down into C to expose some library at some point, I think it’s all of them.

    • krogoth@infosec.pubM
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 days ago

      Not sure if that is even the point. The article is all about memory unsafe programming!!1!. But there is no context at all.

      Sure, there are vulnerabilities because of unsafe memory handling. But I looked for some statistic which would bring unsafe memory handling into context with say the high profile vulnerabilities from the last few weeks / months. I haven’t spent too much time on research but looking at some lists containing vulns from the last few months it seems as if all those pre-auth, priv escalation, directory traversal and whatnot very based on much simpler failures like wrong error handling or logical errors or missing code than unsafe memory handling.

      I might be wrong, then please show me the numbers, but shooting at C/C++ because unsafe!!1! sounds like a very biased story there.

      And while we are at it. I’d also be interested in C vs. (somewhat modern) C++.