On Thu, 14 Aug 2025, 12:53 Alexander Strasser via ffmpeg-devel, <
ffmpeg-devel@ffmpeg.org> wrote:

> On 2025-08-14 18:44 +0200, Michael Niedermayer wrote:
> > On Thu, Aug 14, 2025 at 04:18:03PM +0200, Nicolas George wrote:
> > > Kieran Kunhya via ffmpeg-devel (HE12025-08-14):
> > > > I don't think we should partake in this "security vulnerability
> farming"
> > > > exercise. This isn't a security issue and it spams the code with
> integer
> > > > overflow checks to fix a theoretical issue.
> > >
> > > This is my take on this kind of “bugs” too.
> >
> > I have no oppinion on this, but if INT_MAX hours
> > gives undefined behavior then the API documentation has to exclude that
> > as valid input range and all callers must be checked.
> > (which may imply equivalent checks in some callers)
> >
> > Maybe we should specify in the commit that this is not a security fix
> > but a normal bug fix
> >
> > But the code is buggy if part of the valid API input range results in
> > undefined behavior
>
> I would say invoking UB should be avoided.
>
> I agree with Michael we should either handle it or improve the
> documentation accordingly so users can find out about the limits.
>
> Proposed patches look fine to me.
>
> If updating the docs is preferred that would also be fine if
> someone wants to volunteer to do that.
>

If I were near a computer i would do that instead of spamming the code with
"fixes" for theoretical issues.

Kieran

>
_______________________________________________
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
https://ffmpeg.org/mailman/listinfo/ffmpeg-devel

To unsubscribe, visit link above, or email
ffmpeg-devel-requ...@ffmpeg.org with subject "unsubscribe".

Reply via email to