• lmmarsano@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    8
    ·
    3 days ago

    They’re bug reports: no one needs to fix them. This problem is solved easily enough by letting the chips fall.

    If companies want them fixed badly enough, they can send bug fixes, which is much cheaper than the alternative (paying more engineers to develop & maintain non-open alternatives). Those companies have at least as much interest as anyone to keep that software maintained & secure.

    The position of the FFmpeg X account is that somehow disclosing vulnerabilities is a bad thing.

    The truth is never a bad thing. They don’t need to care. A bug is a bug: better to know than not.

    • nandeEbisu@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      16 hours ago

      Security vulnerabilities are different, especially when they also put a 90 day disclosure period in it which is more severe for a security exploit.

      That disclosure bit, not in the article, is really what tipped this all over the edge. If it was just hey, here’s a bug then its really just flooding the backlog for the maintainers who need to triage that. Disclosures are often used so people are aware that they’re using libraries that the maintainer has refused to patch, but in this case its really just holding the maintainers hostage so they end up wasting their time going through irrelevant issues.

      Also, many of these libraries get security audits to make sure they are actually triaging and working through their backlogs, so could lose actual funding they get.

      Ideally, they would either use their supposedly capable and powerful AI code gen to just make a fix and send over a patch, or at least use LLMs on their own end to triage the issues and only send over the most sever X periodically.

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        14 hours ago

        Security vulnerabilities are different

        No, it’s still open source work, completely voluntary in the free world.

        Disclosures are often used so people are aware that they’re using libraries that the maintainer has refused to patch

        No, they merely tell reality: an unresolved security issue was found. How anyone handles that is their business. There is no inherent duty.

        People who would rather write a fix than write & maintain their own daunting library will send a fix.

        could lose actual funding they get

        If someone’s getting paid, and it’s not worth the work, then that is also their business. It’s still open source. If the solution saves more effort than doing it yourself, then the people who need it won’t just let it all go to waste.

        This is entirely a social issue of managing & rebuffing unrealistic expectations. It’s perfectly valid to set boundaries, remind folks beggars can’t be choosers, and tell them pitching in gets more done.

    • Taldan@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      ·
      3 days ago

      The truth can absolutely be a bad thing. If google reports an important vulnerability, then buries it in CVE slop for 90 days, and publicly announces details of the important vulnerability that hasn’t been fixed yet, it would be worse than if they had never reported it

      The 90-day publishing window is tough when OSS projects are getting buried in AI slop reports

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        3
        ·
        edit-2
        3 days ago

        Then Google would have to put out of the fire of that vulnerability in their dependent software.

        Not disclosing a vulnerability doesn’t stop attackers from exploiting it. A report simply indicates someone who noticed bothered to report it.

        The problem is the vulnerability. False urgency is nothing more: Google’s urgency isn’t the maintainer’s & the maintainers don’t need to “meet the window”. Companies will be left with their pants on fire if they don’t act, too, but it will cost them more. Maintainers can just ignore the window to shift the burden back on moneyed interests as I explained before.

        • nandeEbisu@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          16 hours ago

          Kind of, in this case its a vulnerability in a portion of code that you need to compile with special flags to even include in the library (ie its not in the default build, you need to rebuild it and opt-in) so its super low impact and just ends up giving the maintainers excessive paperwork.

          • lmmarsano@lemmynsfw.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            14 hours ago

            Again, ignoring/postponing is an option. At work, we’d just move that to the backlog of shit we may never touch: having it there is good for tracking the issue & gathering notes on our thoughts regarding it, which saves time approaching it like new each time it comes up. It’s no different for open source maintainers. Marking an item as won’t fix, deferred, or help wanted or closing redundant items isn’t much paperwork.

            Again, the objective reality is the defect exists, and that reality doesn’t change with our awareness of that fact: it’s better to know & track for planning even if the plan is to do nothing.