Thank you for the quick response.

I had intended this as a medium-term fix to the referenced CVE that Google found.  In other words, SMUSH is specifically not secure.  This seems to be the most straightforward approach.  It will prevent anyone using auto-selection of the codec from being the victim of a malicious payload while still allowing them to explicitly use SMUSH for conversions if desired.

I had actually planned to add a new flag when I saw this mechanism already existed for "experimental".  I could add a new flag such as "unsafe" or "pending_cve" or such and key off that as well in the same place?

Or is it the position of ffmpeg that the SMUSH vulnerability should be left in place until a full fix of the codec is made? Your @FFmpeg X account made it sound like there would be no attempt to do this.  But if one is expected reasonably soon perhaps this is not a useful change anyway.

Best Regards,

Oliver


On 11/4/2025 5:56 PM, Rémi Denis-Courmont wrote:
Hi,

Experimental means part of an experiment. The SMUSH decoder might have 
qualified as experimental while it was being implemented (reverse engineered?), 
but not today.

What it is is unsupported, but the same could be said of, well, essentially 
every codec in FFmpeg, as per the GPL/LGPL warranty disclaimer. SMUSH is also 
not formally proven secure, but again, the same could be said of every codecs 
(or almost) in FFmpeg as of today.

The same argument that FFmpeg should disable game codecs or other "unsupported" 
was raised on Saturday at VDD. Though those discussions do not bind the FFmpeg project in 
any way, most people in the room seemed to agree that classifying the hundreds of codecs 
in such vague, variable and subjective wasn't viable.

In other words, it's up to whoever compiles the software downstream to 
determine what they want to support and what they don't, IMO, not the FFmpeg 
project/community.
_______________________________________________
ffmpeg-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to