Control: severity -1 normal

So long as we ship CVS in general and there are earnest CVS deployments
in the wild (for better or for worse), I don't see a compelling reason
for CVS being a carte blanche de mal.

The statement at 
https://cgit.freebsd.org/doc/commit/?id=65402a3cc2b34ee34ddb598266b5cc30ef03d41b
reads like a generic "we don't maintain this anymore" liability
disclaimer for those hypothetical "unpatched security issues".

To this end, both OpenBSD and openwall have CVSWeb sites:
  https://cvsweb.openbsd.org/
  https://cvsweb.openwall.com/
are these insecure? Very unlikely.

The openwall one points at FreeBSD but the OpenBSD one doesn't;
accd'g to https://openports.pl/path/devel/cvsweb,
it's using the https://cvsweb.bsd.lv/ upstream which explicitly adopts it:
> CVSweb was originally developed by members of the FreeBSD project
> and is currently maintained by on BSD.lv. 
and the 3.x branch we ship hasn't received a new release
(but the 2.x branch did get a release with fixes,
 so if 3.x needed one it would've gotten it).

I see an ITA dated 2024-12-02 in #660684 from Jing Luo, whom I've CCed.
The VCS looks to be
  svn://anonscm.debian.org/collab-maint/deb-maint/cvsweb/trunk/
and this has not been preserved on alioth-archive.debian.org.
I've imported the history to https://salsa.debian.org/salvage-team/cvsweb
a DD should move this to https://salsa.debian.org/debian/cvsweb
and invite Jing (@del111).

Given there's no new release, I think that all this really wants,
from a longevity stand-point, is a simple watch file
and retargeting the Homepage: at https://cvsweb.bsd.lv/.

Best,

Attachment: signature.asc
Description: PGP signature

Reply via email to