Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Providing a real CVE is a contribution, not a burden. The ffmpeg folks can ignore it, since by all indications it's pretty minor.

Re-read the article. There's CVEs and then there's CVEs. This is the former, and they're shoving tons of those down the throats of unpaid volunteers while contributing nothing back.

What Google's effectively doing is like a food safety inspection company going to the local food bank to get the food that they operate their corporate cafeteria on just to save a buck, then calling the health department on a monthly basis to report any and all health violations they think they might have seen, while contributing nothing of help back to the food bank.



I have read the article. The expectation for a tool like ffmpeg is that regardless of what kind of file you put into it, it safely handles it.

This is an actual bug in submitted code. It doesn't matter that it's for some obscure codec, it's technically maintained by the ffmpeg project and is fair game for vulnerability reports.

Given that Google is also a major contributor to open-source video, this is more like a food manufacturer making sure that grocery stores are following health code when they stock their food.

Mind you, the grocery store has no obligation to listen to them in this metaphor and is free to just let the report/CVE sit for a while.


I am unsure why this untruth is being continuously parroted. It is false.

This is exploitable on a majority of systems as the codec is enabled by default. This is a CVE that is being severely underestimated.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: