• Endymion_Mallorn@kbin.melroy.org
    link
    fedilink
    arrow-up
    14
    ·
    4 hours ago

    I mean, the simple solution is to do the same as curl’s dev: If it’s AI, it’s ignored. If it’s a corporation who hasn’t had recent code published in the codebase, it’s ignored. Bugs and vulnerabilities should be human-reported by the community.

    That’s the way forward for FOSS - ignore the corps. Then start rebasing on exclusively non-commercial licenses.

    • solrize@lemmy.ml
      link
      fedilink
      arrow-up
      9
      ·
      edit-2
      3 hours ago

      AI reports are ignored because they are so frequently crap that they are almost not worth investigating. If these ffmpeg reports are from Project Zero though, they are presumably real. Shipping code with vulnerabilities is always a terrible idea. If Google can find them, attackers can also find them.

      I do have to wonder how many of these vulnerabilities are actually in the assembly language parts of the codecs. I had guessed they were more likely to be at the higher levels.

  • Tony Bark@pawb.social
    link
    fedilink
    English
    arrow-up
    28
    ·
    6 hours ago

    What happened to forking these projects and going their own route? If they’re so confidant in AI, they could just vibe code their way through.

  • Venia Silente@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    21
    ·
    6 hours ago

    if Google has the resources to put AI to slop bug reports, then it also has the resources to put AI to also post the fixes. So, they should get going. No one owes Google of all corporations free labour.

    • TehPers@beehaw.org
      link
      fedilink
      English
      arrow-up
      20
      ·
      5 hours ago

      I think the last thing ffmpeg devs want is AI generated bugfixes to their assembly-heavy codebase. What they should do is dedicate time for experienced devs to fix the bugs instead.

    • LukeZaz@beehaw.org
      link
      fedilink
      English
      arrow-up
      10
      ·
      5 hours ago

      Better suggestion: Stop using AI to do any of this shit. Security research and vulnerability patching should not be reliant upon de facto black-box random number generators.

      • James R Kirk@startrek.website
        link
        fedilink
        English
        arrow-up
        10
        ·
        3 hours ago

        I have no issue with using AI to find otherwise undiscovered security bugs. But attempting to fixing them with AI I’m not in favor of.

        • The Bard in Green@lemmy.starlightkel.xyz
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 hours ago

          The user’s code is vulnerable to a buffer overflow in certain edge cases. I need to patch the vulnerability and commit the patch to the repo.

          I should rewrite the existing memmanage() function to handle these edge cases. (* Silently removes all other functionality*)

          I should modify garbagecollect() to detect these edge cases. I’ll rename it to garbage_collector() for clarity and readability. (Renames the function, calls it no where)

          Confidently I modified the program as requested, the new version of your application should be more secure and handled memory issues much more efficiently.

  • solrize@lemmy.ml
    link
    fedilink
    arrow-up
    14
    arrow-down
    1
    ·
    7 hours ago

    I’d like FFmpeg to get more funding, but the bugs being reported are valid security bugs, so it seems desirable to send them anyway, preferably with fixes.

    • Gamma@beehaw.org
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      6 hours ago

      Eeeeh, I think a lot of the ai reports are pretty low value. The article says:

      This “medium impact issue in ffmpeg,” which the FFmpeg developers did patch, is “an issue with decoding LucasArts Smush codec, specifically the first 10-20 frames of Rebel Assault 2, a game from 1995.”

      Google can pay more to fix these issues, ffmpeg already hits their 3 bounty/month limit.

      • solrize@lemmy.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        5
        ·
        6 hours ago

        If there’s a vulnerability in the codec, then someone can slip a malicious file onto some web site and use it as an exploit. It’s not only about some 30 year old game. It might be appropriate for ffmpeg to get rid of such obscure codecs, or sandbox them somehow so RCE’s can’t escape from them, even at an efficiency cost. Yes though, Google funding or even a Summer of Code sponsorship would be great.

        • TehPers@beehaw.org
          link
          fedilink
          English
          arrow-up
          14
          ·
          edit-2
          5 hours ago

          The issue is not whether security issues exist in ffmpeg. It’s clear that vulnerabilities need to be fixed.

          The issue is with who actually fixes them. Your last sentence is the core of it. Google can submit as many bug reports as they want, but they better be willing to ensure the bugs get fixed too.

          • Midnitte@beehaw.org
            link
            fedilink
            English
            arrow-up
            8
            ·
            5 hours ago

            If it’s a mission critical library, then the corporations should be willing to shell out money to ensure critical bugs are fixed.

            Google can’t have their cake and eat it too.

          • solrize@lemmy.ml
            link
            fedilink
            arrow-up
            4
            ·
            4 hours ago

            Google having found the bugs can either submit bug reports or quietly sit on them, or even exploit them as spyware, among other ideas. Whether they fund ffmpeg is a completely separate question. I can see how the 90 day disclosure window can be a problem if the number of reports is high.

            • TehPers@beehaw.org
              link
              fedilink
              English
              arrow-up
              3
              ·
              3 hours ago

              Bug reports that apply only to Google’s services or which surface only because of them are bugs Google needs to fix. They can and do submit bug reports all they want. Nobody is obligated to fix them.

              The other part of this is, of course, disclosure. Google’s disclosure of these bugs discredits ffmpeg developers and puts the blame on them if they fail to fix the vulnerabilities. They can acknowledge the project as being a volunteer, hobby project created by others if they want, and they can treat it like that. But if they’re doing that, they should not be putting responsibilities on them.

              If Google wants to use ffmpeg, they can. But a bug in ffmpeg that affects Google’s services is a bug in Google’s service. It is not the responsibility of unpaid volunteers to maintain their services for them.

              • solrize@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                edit-2
                1 hour ago

                I don’t understand how a bug is supposed to know whether it’s triggered inside or outside of a google service. If the bug can only be triggered in some weird, google-specific deployment, that’s one thing, but I don’t think that’s what we’re talking about here. If the bug is manifestly present in ffmpeg and it’s discovered at google, what are you saying is supposed to happen? Google should a) report it under the normal 90 day disclosure rule; b) report it but let it stay undisclosed for longer than normal, due to the resource contraints ffmpeg’s devs areunder; c) not report it and let some attacker exploit it? (b) might have some merit but (c) is insane. Once some bad actor finds out about the bug (through independent discovery or any other way), it’s going to be exploited. That might already be happening before even google finds the bug.

                FFmpeg’s codebase and dev community are both exceptionally difficult and that is not helping matters, I’m sure.

                There are a bunch of Rust zealots busily rewriting GNU Coreutils which in practice have been quite reliable and not that badly in need of rewriting. Maybe the zealots should turn their attention to ffmpeg (a bug minefield of long renown) instead.

                Alternatively (or in addition), some effort should go into sandboxing ffmpeg so its bugs can be contained.

    • Björn@swg-empire.de
      link
      fedilink
      arrow-up
      12
      ·
      6 hours ago

      … Why?

      Chances are good that you are using ffmpeg in one form or another. It is used in tons of software and services like your browser or Twitch and YouTube.

      It’s pretty close to xkcd/2347 status.

        • LukeZaz@beehaw.org
          link
          fedilink
          English
          arrow-up
          8
          ·
          5 hours ago

          Bad journalism has nothing to do with this. Literal first paragraph of the article:

          You may never have heard of FFmpeg, but you’ve used it. This open source program’s robust multimedia framework is used to process video and audio media files and streams across numerous platforms and devices. It provides tools and libraries for format conversion, aka transcoding, playback, editing, streaming, and post-production effects for both audio and video media.

          If you weren’t paying attention until someone pointed out your error, just say that. We won’t crucify you.