Debian Package Tracker
Register | Log in
Subscribe

aom

Choose email to subscribe with

general
  • source: aom (main)
  • version: 3.3.0-2
  • maintainer: Debian Multimedia Maintainers (archive) (DMD)
  • uploaders: James Cowgill [DMD]
  • arch: all any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.0.0-3
  • stable: 1.0.0.errata1-3
  • stable-bpo: 3.3.0-1~bpo11+1
  • testing: 3.3.0-2
  • unstable: 3.3.0-2
versioned links
  • 1.0.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.0.errata1-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.0-1~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • aom-tools
  • libaom-dev
  • libaom-doc
  • libaom3
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2020-0478: In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418
Created: 2021-02-19 Last update: 2022-05-19 05:36
8 security issues in buster high

There are 8 open security issues in buster.

4 important issues:
  • CVE-2020-0478: In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418
  • CVE-2021-30473: aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
  • CVE-2021-30474: aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use-after-free.
  • CVE-2021-30475: aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow.
4 issues left for the package maintainer to handle:
  • CVE-2020-36130: (needs triaging) AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.
  • CVE-2020-36131: (needs triaging) AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.
  • CVE-2020-36133: (needs triaging) AOM v2.0.1 was discovered to contain a global buffer overflow via the component av1/encoder/partition_search.h.
  • CVE-2020-36135: (needs triaging) AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2022-05-19 05:36
8 security issues in bullseye high

There are 8 open security issues in bullseye.

4 important issues:
  • CVE-2020-0478: In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418
  • CVE-2021-30473: aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
  • CVE-2021-30474: aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use-after-free.
  • CVE-2021-30475: aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow.
4 issues left for the package maintainer to handle:
  • CVE-2020-36130: (needs triaging) AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.
  • CVE-2020-36131: (needs triaging) AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.
  • CVE-2020-36133: (needs triaging) AOM v2.0.1 was discovered to contain a global buffer overflow via the component av1/encoder/partition_search.h.
  • CVE-2020-36135: (needs triaging) AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2022-05-19 05:36
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2020-0478: In extend_frame_lowbd of restoration.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150780418
Created: 2021-08-15 Last update: 2022-05-19 05:36
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-05-19 Last update: 2022-05-19 22:33
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-11-05 Last update: 2021-11-05 04:31
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2018-09-20 Last update: 2018-09-20 02:18
news
[rss feed]
  • [2022-05-19] aom 3.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-05-16] Accepted aom 3.3.0-2 (source) into unstable (Boyuan Yang)
  • [2022-03-06] Accepted aom 3.3.0-1~bpo11+1 (source) into bullseye-backports (Boyuan Yang)
  • [2022-02-23] aom 3.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-20] Accepted aom 3.3.0-1 (source) into unstable (Boyuan Yang)
  • [2021-12-10] aom 3.2.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-12-05] Accepted aom 3.2.0-2 (source) into unstable (Boyuan Yang)
  • [2021-11-13] Accepted aom 3.2.0-1~bpo11+1 (source amd64 all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Boyuan Yang)
  • [2021-11-04] aom 3.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-01] Accepted aom 3.2.0-1 (source) into unstable (Boyuan Yang)
  • [2021-10-30] aom 1.0.0.errata1.ds-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-27] Accepted aom 1.0.0.errata1.ds-1 (source) into unstable (Boyuan Yang)
  • [2021-10-26] Accepted aom 3.2.0-1~exp1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Boyuan Yang)
  • [2021-10-21] Accepted aom 1.0.0.errata1.avif-1 (source) into unstable (Boyuan Yang)
  • [2020-01-05] aom 1.0.0.errata1-3 MIGRATED to testing (Debian testing watch)
  • [2020-01-02] Accepted aom 1.0.0.errata1-3 (source) into unstable (James Cowgill)
  • [2019-09-03] aom 1.0.0.errata1-2 MIGRATED to testing (Debian testing watch)
  • [2019-09-01] Accepted aom 1.0.0.errata1-2 (source) into unstable (James Cowgill)
  • [2019-08-31] Accepted aom 1.0.0.errata1-1 (source) into unstable (James Cowgill)
  • [2018-10-07] aom 1.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2018-10-04] Accepted aom 1.0.0-3 (source) into unstable (James Cowgill)
  • [2018-09-22] aom 1.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2018-09-20] Accepted aom 1.0.0-2 (source) into unstable (James Cowgill)
  • [2018-09-19] Accepted aom 1.0.0-1 (all amd64 source) into unstable, unstable (James Cowgill)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.3.0-2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing