• Bug#1106884: aom: Guard the support of the 7.x and 8.x levels for AV1 u

    From Salvatore Bonaccorso@21:1/5 to All on Sat May 31 10:00:01 2025
    Source: aom
    Version: 3.6.0-1
    Severity: serious
    Tags: upstream fixed-upstream bookworm
    X-Debbugs-Cc: Wan-Teh Chang <wtc@google.com>, James Zern <jzern@google.com>, carnil@debian.org, byang@debian.org
    Control: found -1 3.6.0-1+deb12u1
    Control: fixed -1 3.6.1-1

    As notified by upstream, the version of src:aom in Debian bookworm has
    a serious bitstream incompatibility bug for large frame size. That bug
    is fixed in libaom 3.6.1. It is the first bug fix in the release
    announcement: https://groups.google.com/a/aomedia.org/g/av1-discuss/c/giBE6Kya0aI

    If updating to 3.6.1 is not an option by rebasing the version with 3.6.0-0+deb12u1 (but not loosing the previous applied security fixes
    from Moritz Muehlenhoff), then the following two commits would be the cherry-picks needed:

    https://aomedia.googlesource.com/aom/+/7b310b5df8ad7362df248a35a1412fe093a44296 https://aomedia.googlesource.com/aom/+/7f006ee7f3da90c86d1b05696a5feac4f4162ac9

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Fri Jun 20 00:10:01 2025
    This is a multi-part message in MIME format...

    Your message dated Thu, 19 Jun 2025 22:02:39 +0000
    with message-id <E1uSNLD-005jDT-9u@fasolo.debian.org>
    and subject line Bug#1106884: fixed in aom 3.6.0-1+deb12u2
    has caused the Debian Bug report #1106884,
    regarding aom: Guard the support of the 7.x and 8.x levels for AV1 under the CONFIG_CWG_C013 config flag, and only output the 7.x and 8.x levels when explicitly requested
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1106884: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106884
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 31 May 2025 07:49:13 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
    (2024-03-25) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-9.6 required=4.0 tests=BAYES_00,FROMDEVELOPER,
    KHOP_HELO_FCRDNS,MD5_SHA1_SUM,PDS_RDNS_DYNAMIC_FP,
    RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED,
    RCVD_IN_VALIDITY_SAFE_BLOCKED,RDNS_DYNAMIC,SPF_HELO_NONE,SPF_NONE,
    XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=4.0.1-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 29; hammy, 149; neutral, 45; spammy,
    1. spammytokens:0.944-+--H*r:bugs.debian.org
    hammytokens:0.000-+--H*F:U*carnil, 0.000-+--XDebbugsCc,
    0.000-+--X-Debbugs-Cc, 0.000-+--bookworm, 0.000-+--H*r:eldamar.lan Return-path: <carnil@debian.org>
    Received: from c-82-192-244-13.cust