Libxml2's "no security embargoes" policy
Reliance on libxml2 and maintenance reality
- Commenters are alarmed that libxml2/libxslt, used in multi‑billion‑dollar products and OSes, are effectively solo‑maintained passion projects.
- Some argue the real problem isn’t libxml2’s intrinsic “quality” but that corporations built critical infrastructure atop what are essentially hobby projects.
- Others push back on framing libxml2 as “not production quality,” saying it works fine for most use and that browser/OS‑scale, internet‑facing security is a special case.
Corporate responsibility and funding
- Strong sentiment that large companies (Apple, Google, Microsoft, banks, etc.) relying on libxml2 should fund maintenance instead of pushing security workload onto volunteers.
- Suggestions include: direct sponsorships, support contracts, or companies effectively becoming upstream maintainers.
- Counterpoint: coordination among many companies is hard; some see taxes/government funding for core OSS as more realistic, others reject that as “subsidizing bad business models.”
Licensing, “freeloading,” and expectations
- Debate over whether permissive licensing (MIT/BSD) invites exactly this outcome and whether GPL/AGPL would deter corporate free‑riding.
- Others note GPL doesn’t help with internal use and doesn’t solve the need for paid maintainers.
- Some maintainers openly say they don’t care if corporations can’t use their GPL‑licensed code; they prioritize individuals and fair reciprocity.
Security reports, CVEs, and DoS severity
- Many complain about “CVE inflation”: unreachable bugs, null derefs on malloc failure, panics, regex DoS, and obscure APIs all being labeled high‑severity.
- Maintainers describe these reports as noisy, often lacking PoCs or patches, and primarily serving security vendors’ reputations.
- Others emphasize that availability is part of security (CIA triad), and DoS can be life‑critical in contexts like healthcare or banking.
- Several argue severity is highly context‑dependent and that worst‑case CVSS scoring plus compliance tooling creates busywork and drowns out truly critical issues.
Embargoes vs. full disclosure
- Many support libxml2’s “no embargo” stance: treat security bugs like any other bug, public from the start, fixed when time/patches exist.
- Rationale: embargoes impose schedules and expectations inappropriate for unpaid volunteers and largely benefit security firms and large vendors.
Roles and boundaries: maintainers vs users
- Strong view that unpaid maintainers owe users nothing beyond the licensed code; “patch or payment or fork it yourself” is seen as reasonable.
- Others stress emotional investment and social pressure make it hard for maintainers to simply say no, leading to burnout.
- Some suggest explicit MAINTENANCE-TERMS documents stating: what is supported, how security is handled, and that low‑priority issues require patches or funding.