Re: libxml2 video about its abandonment

From: Iván Chavero <ichavero(at)chavero(dot)com(dot)mx>
To: pgsql-hackers(at)lists(dot)postgresql(dot)org
Subject: Re: libxml2 video about its abandonment
Date: 2025-12-17 16:12:48
Message-ID: e5b6ddfd-e7a6-4329-b708-2089e947f36b@chavero.com.mx
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers


Hello,

As of december 9th libxml2 has two maintainers:

Daniel Garcia Moreno and Iván Chavero (me), we're trying to

steer the project in a more positive direction.

Contributions are welcome!

Cheers,

Iván

En 17/12/25 8:21 a.m., Bruce Momjian escribió:
> Here is a video about the current status of libxml2's abandonment
> status:
>
> https://www.youtube.com/watch?v=GDr4fKXmUvc
>
> The current libxml2 security text is below -- I think this is a positive
> development. It was rewritten on December 10 to create "a more positive
> Security section":
>
> This patch changes the security section in the README.md file to
> give more information.
>
> This removes the "unmaintained" text, as this project is
> maintained again. It also makes it clear that this is a
> community project, so anyone will know what to expect, and it
> also makes explicit that developers are volunteers and will work
> on the issues that they want, as a try to avoid pressure from
> bug reporters.
>
> The message tries to be positive, promoting collaboration instead
> of conflict. The idea is to make it clear that collaboration is
> welcome and the way to go is to do it yourself instead of asking
> the maintainers to do it for you.
>
> Here is the current Security section text:
>
> https://gitlab.gnome.org/GNOME/libxml2
>
> Security
>
> This is open-source software written by hobbyists and maintained
> by volunteers.
>
> It's NOT recommended to use this software to process untrusted
> data. There is a lot of ways that a malicious crafted xml could
> exploit a hidden vulnerability in the software.
>
> The software is provided "as is", without warranty of any kind,
> express or implied. Use this software at your own risk.
>
> To report security bugs, you can create a confidential issue
> with the "security" label. We will review and work on it as a
> best effort. But remember that this is a community project,
> maintained by volunteer developers, so if you are concern about
> any important security bug that's critical for you, feel free to
> collaborate and provide a patch.
>
> The main rule is to be kind. Do not pressure developers to fix
> a CVE or to work on a functionality that you need, because
> that won't work. This is a community project, developers will
> work in the issues that they consider interesting and when
> they want. All contributions are welcome, so if something is
> important for you, you can always get involved, implement it
> yourself and be part of the open source community.
>

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Andres Freund 2025-12-17 16:50:32 Re: pg_dump: Remove trivial usage of PQExpBuffer
Previous Message Andres Freund 2025-12-17 16:10:01 Re: RFC: adding pytest as a supported test framework