On Wed, May 28 2025 at 06:18:41 PM -04:00:00, Neal Gompa <ngomp...@gmail.com> wrote:
Honestly, we don't really push for security like that. We have
generally provided optionality, but that doesn't mean we want security
to outweigh our community and usability. The crypto policies is an
example of the problems caused by pushing security above everything
else, as we wound up with several releases in a row of the package
manager being broken because RPM could no longer verify Google
Chrome's GPG keys (among other things).

This is really not at all a comparable situation. A heap buffer overflow in a video decoder is an urgency that requires timely response.

That said, keep in mind there are going to be many, many other similar bugs in every video decoder that we do not know about, so it doesn't make sense to worry *too* much about any particular such issue. The inability to fix known vulnerabilities is a bigger problem than the vulnerability itself.

Software developers MUST plan for videos decoders to be compromised by unknown zero day issues. Video decoding should ideally be performed in a sandbox. If you're watching video in your web browser and are compromised via the OpenH264 decoder or any other video decoder, you can be confident that a separate sandbox escape is required to attack your desktop, which is expected to be much harder than exploiting the decoder. Whereas if you're watching the same video locally using a Totem/Showtime/VLC RPM, that is pretty dangerous and you'd better really trust that video file. Watching the same video in the same app packaged by Flatpak instead of RPM could be much safer, but only if the sandbox is not subverted, and in practice it's very common for Flatpak apps to subvert their sandboxes.

Michael


--
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to