Google has called for a public-private partnership to identify a list of critical open source projects and find new ways of identifying software that might pose a systemic risk, as the world grapples with the recent log4j open source software vulnerability that has put millions of devices at hacking risk.
Following a summit on open-source security hosted at the White House on Thursday, Google said the collaboration between government and the private sector was needed for open-source funding and management.
"We need a public-private partnership to identify a list of critical open source projects -- with criticality determined based on the influence and importance of a project -- to help prioritise and allocate resources for the most essential security assessments and improvements," said Kent Walker, president for global affairs and chief legal officer at Google and Alphabet.
Open source software code is available to the public, free for anyone to use, modify, or inspect.
Since it is freely available, open source facilitates collaborative innovation and the development of new technologies to help solve shared problems.
"That's why many aspects of critical infrastructure and national security systems incorporate it. But there's no official resource allocation and few formal requirements or standards for maintaining the security of that critical code," said Google.
In fact, most of the work to maintain and enhance the security of open source, including fixing known vulnerabilities, is done on an ad hoc, volunteer basis.
"Longer term, we need new ways of identifying software that might pose a systemic risk -- based on how it will be integrated into critical projects -- so that we can anticipate the level of security required and provide appropriate resourcing," Google noted.
The 'Log4j' vulnerabilities represent a complex and high-risk situation for companies across the globe.
This open-source component is widely used across many suppliers' software and services.
"Sophisticated adversaries (like nation-state actors) and commodity attackers alike have been observed taking advantage of these vulnerabilities. There is high potential for the expanded use of the vulnerabilities," according to Microsoft.
Cyber criminals are making thousands of attempts to exploit a second vulnerability involving a Java logging system called 'Apache log4j2'.
Google recently said that more than 35,000 Java packages, amounting to over 8 per cent of the Maven Central repository (the most significant Java package repository), have been impacted by the recently disclosed vulnerabilities with widespread fallout across the software industry.
The Apache Software Foundation has released several updates in the wake of the widespread 'Log4Shell' vulnerability in Log4j version 2 branch.
( 430 Words)