10
I Use This!
High Activity
Analyzed about 9 hours ago. based on code collected about 12 hours ago.

Project Summary

Newlib is a C library intended for use on embedded systems. It is a conglomeration of several library parts, all under free software licenses that make them easily usable on embedded products.

Newlib is only available in source form. It can be compiled for a wide array of processors, and will usually work on any architecture with the addition of a few low-level routines.

Newlib is the C Library used by Cygwin and RTEMS.

Tags

c embedded libc malloc standard-library static

BSD 3-clause "New" or "Revised" License
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Hold Liable

Use Trademarks

Required

Include Copyright

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    search using multiple tags to find exactly what you need
  • ...
    use of OSS increased in 65% of companies in 2016
  • ...
    check out hot projects on the Open Hub
About Project Security

Languages

C
60%
C++
15%
Make
9%
17 Other
16%

30 Day Summary

Dec 10 2025 — Jan 9 2026

12 Month Summary

Jan 9 2025 — Jan 9 2026
  • 989 Commits
    Up + 323 (48%) from previous 12 months
  • 57 Contributors
    Up + 12 (26%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for RTEMS-Newlib )

Repository URL: https://sourceware.org/git/newlib-cygwin.git

Version: b41e3b652

2026-01-06
Last Analyzed
92,779
Lines of Code Analyze
1.46
Defect Density

Defects by status for current build

197
Total defects
135
Outstanding
61
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 4
190 Integer Overflow or Wraparound 20
676 Use of Potentially Dangerous Function 1