On Sat, Jun 17, 2006 at 01:56:45AM -0500, Jolan Luff wrote:
> On Sat, Jun 17, 2006 at 06:00:27AM +0200, Tobias Ulmer wrote:
> 
> <snip>
> 
> > While i like this tool well, the attitude of the main developer
> > regarding security issues is very disturbing. (The bugtracker of the
> > project and securityfocus are a good read on that)
> > 
> > My question is, should we bother and fix these issues? I have some but
> > by far not all patches ready. The sad part of it is that most won't
> > make it back into cscope...
> > 
> > IMHO, cscope could as well be 'cvs rm -f'ed
> 
> I would hope people aren't running it only as root on multi-user systems.
> I don't really view cscope as high risk software.  I know of at least
> two OpenBSD developers who use cscope regularly, so it'd certainly be
> better to keep it around.  We typically don't like to maintain large
> patchsets in the ports tree.  Maybe just fix the temp file problem and
> some of the other big issues so you can sleep better at night?  Or work
> with the cscope guys and tell them how to roll their own snprintf
> function for DOS.  Or if you're really dedicated, finish your patchset
> and fork cscope ;)

I disagree. User-level security is very important; of course, root
compromise is still the worst that can happen, but if people use su or
sudo - and many do - user-level access is uncomfortably close to
root-level access.

Plus, all my data is in my user-level account, and I wouldn't like to
have it all removed, even if I am one of the few people on this earth
with a working backup.

Of course, after all this whining, I don't use cscope and I am not
planning on forking it to fix the problems. But marking it broken might
be a good idea.

                Joachim

Reply via email to