61 points

… Are the Feds aware that the core systems that many, many older companies (and government agencies) use are still based on COBOL?

Is… is that not of any concern?

permalink
report
reply
22 points

Is COBOL subject to buffer overflows and use-after-free bugs? I honestly don’t know.

I don’t recall the COBOL code I’ve read using pointers.

permalink
report
parent
reply
13 points

The problem I am aware of is moreso that the number of programmers that know COBOL is vanishingly small, it … COBOL does not seem to really be taught anymore…

…so if something goes wrong at that level, you may be SOL if you cannot find an increasingly rare programmer that knows COBOL well.

permalink
report
parent
reply
5 points

The article says this isn’t to affect existing code.

permalink
report
parent
reply
0 points
Deleted by creator
permalink
report
parent
reply
42 points

That sounds like policy written by somebody who has no idea what the reality of software development is.

1 year to rewrite critical software in a new language?

permalink
report
reply
79 points

Did you read the article at all?

“Putting all new code aside, fortunately, neither this document nor the U.S. government is calling for an immediate migration from C/C++ to Rust — as but one example,” he said. “CISA’s Secure by Design document recognizes that software maintainers simply cannot migrate their code bases en masse like that.”

Companies have until January 1, 2026, to create memory safety roadmaps.

All they are asking for by that date is a roadmap for dealing with memory safety issues, not rewrite everything.

permalink
report
parent
reply
24 points

That sounds like a comment written by somebody who has no idea what the article says

permalink
report
parent
reply
1 point

Solid detective work Lou.

permalink
report
parent
reply
25 points
*

Don’t assume too much from the headline, folks. They’re not saying everything has to be rewritten by 2026. They’re saying new product lines serving critical infrastructure should be written in memory-safe languages, and existing ones should have a memory safety roadmap.

If you’re about to post about how you think that’s unreasonable, I think you should explain why.

permalink
report
reply
12 points

That is an extremely oddly specific cysec issue they’re choosing to target…

permalink
report
reply
19 points

It’s one backed by a lot of data. One example is from the Android project.

The percent of vulnerabilities caused by memory safety issues continues to correlate closely with the development language that’s used for new code. Memory safety issues, which accounted for 76% of Android vulnerabilities in 2019, and are currently 24% in 2024, well below the 70% industry norm, and continuing to drop.

https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html

There’s an argument that critical infrastructure software vendors are already meeting standards for basic, non-memory related items. Yes, there are other categories, but memory safety is one that’s harder to verify. Moving to memory safe languages is an ensure a category of correctness. This excludes usage of unsafe escape hatches.

permalink
report
parent
reply
12 points
*

Feds have found a way to hack rust /s?

permalink
report
reply
15 points

DARPA has unironically been funding a tool that purports to translate C / C++ into Rust…

https://www.darpa.mil/program/translating-all-c-to-rust

permalink
report
parent
reply
1 point

That’s nice.

permalink
report
parent
reply

Programming

!programming@programming.dev

Create post

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person’s post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you’re posting long videos try to add in some form of tldr for those who don’t want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



Community stats

  • 3K

    Monthly active users

  • 1.8K

    Posts

  • 30K

    Comments