Your message dated Fri, 02 Dec 2016 15:36:38 +0000
with message-id <e1ccpt8-00074q...@fasolo.debian.org>
and subject line Bug#845785: fixed in chromium-browser 55.0.2883.75-1
has caused the Debian Bug report #845785,
regarding chromium: Crash on facebook since 54.0.2840.101-1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
845785: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845785
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 54.0.2840.101-1
Severity: grave
Justification: renders package unusable
Dear Maintainer,
newer version of chromium crashes when visiting facebook
Creating this bug so that other unstable users know to hold their upgrade.
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.8.8a (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages chromium depends on:
ii libasound2 1.1.2-1
ii libatk1.0-0 2.22.0-1
ii libavcodec57 7:3.2-2
ii libavformat57 7:3.2-2
ii libavutil55 7:3.2-2
ii libc6 2.24-7
ii libcairo2 1.14.6-1.1
ii libcups2 2.2.1-2
ii libdbus-1-3 1.10.12-1
ii libevent-2.0-5 2.0.21-stable-2.1
ii libexpat1 2.2.0-1
ii libflac8 1.3.1-4
ii libfontconfig1 2.11.0-6.7
ii libfreetype6 2.6.3-3+b1
ii libgcc1 1:6.2.1-5
ii libgdk-pixbuf2.0-0 2.36.0-1
ii libglib2.0-0 2.50.2-2
ii libgtk2.0-0 2.24.31-1
ii libharfbuzz0b 1.2.7-1+b1
ii libjpeg62-turbo 1:1.5.1-2
ii libminizip1 1.1-8
ii libnettle6 3.3-1
ii libnspr4 2:4.12-6
ii libnss3 2:3.26.2-1
ii libpango-1.0-0 1.40.3-3
ii libpangocairo-1.0-0 1.40.3-3
ii libpng16-16 1.6.26-2
ii libpulse0 9.0-5
ii libre2-3 20161101+dfsg-2
ii libsnappy1v5 1.1.3-3
ii libstdc++6 6.2.1-5
ii libvpx4 1.6.0-3
ii libwebp6 0.5.1-3
ii libwebpdemux2 0.5.1-3
ii libx11-6 2:1.6.3-1
ii libxcomposite1 1:0.4.4-1
ii libxcursor1 1:1.1.14-1+b1
ii libxdamage1 1:1.1.4-2+b1
ii libxext6 2:1.3.3-1
ii libxfixes3 1:5.0.2-1
ii libxi6 2:1.7.6-1.1
ii libxml2 2.9.4+dfsg1-2.1
ii libxrandr2 2:1.5.0-1
ii libxrender1 1:0.9.9-2
ii libxslt1.1 1.1.29-2
ii libxss1 1:1.2.2-1
ii libxtst6 2:1.2.2-1+b1
ii x11-utils 7.7+3
ii xdg-utils 1.1.1-1
ii zlib1g 1:1.2.8.dfsg-2+b3
Versions of packages chromium recommends:
ii fonts-liberation 1:1.07.4-2
Versions of packages chromium suggests:
pn chromium-l10n <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chromium-browser
Source-Version: 55.0.2883.75-1
We believe that the bug you reported is fixed in the latest version of
chromium-browser, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 845...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Gilbert <mgilb...@debian.org> (supplier of updated chromium-browser
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 02 Dec 2016 02:06:59 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromedriver
Architecture: source
Version: 55.0.2883.75-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers
<pkg-chromium-ma...@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilb...@debian.org>
Description:
chromedriver - web browser - WebDriver support
chromium - web browser
chromium-l10n - web browser - language packs
Closes: 845785
Changes:
chromium-browser (55.0.2883.75-1) unstable; urgency=medium
.
* New upstream stable release:
- CVE-2016-9651: Private property access in V8. Credit to Guang Gong
- CVE-2016-5208: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5207: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5206: Same-origin bypass in PDFium. Credit to Rob Wu
- CVE-2016-5205: Universal XSS in Blink. Credit to Anonymous
- CVE-2016-5204: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5209: Out of bounds write in Blink. Credit to Giwan Go
- CVE-2016-5203: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5210: Out of bounds write in PDFium. Credit to Ke Liu
- CVE-2016-5212: Local file disclosure in DevTools. Credit to Khalil Zhani
- CVE-2016-5211: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5213: Use after free in V8. Credit to Khalil Zhani
- CVE-2016-5214: File download protection bypass. Credit to Jonathan Birch
and MSVR
- CVE-2016-5216: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5215: Use after free in Webaudio. Credit to Looben Yang
- CVE-2016-5217: Use of unvalidated data in PDFium. Credit to Rob Wu
- CVE-2016-5218: Address spoofing in Omnibox. Credit to Abdulrahman
Alqabandi
- CVE-2016-5219: Use after free in V8. Credit to Rob Wu
- CVE-2016-5221: Integer overflow in ANGLE. Credit to Tim Becker
- CVE-2016-5220: Local file access in PDFium. Credit to Rob Wu
- CVE-2016-5222: Address spoofing in Omnibox. Credit to xisigr
- CVE-2016-9650: CSP Referrer disclosure. Credit to Jakub Żoczek
- CVE-2016-5223: Integer overflow in PDFium. Credit to Hwiwon Lee
- CVE-2016-5226: Limited XSS in Blink. Credit to Jun Kokatsu
- CVE-2016-5225: CSP bypass in Blink. Credit to Scott Helme
- CVE-2016-5224: Same-origin bypass in SVG. Credit to Roeland Krak
- CVE-2016-9652: Various fixes from internal audits, fuzzing and other
initiatives
* Make it possible to pass build flags into gn (closes: #845785).
Checksums-Sha1:
2860537b005b6bdc31a7d4cdc018b97e8745828c 3990
chromium-browser_55.0.2883.75-1.dsc
7e19210a25ae94e17b0fd93625642d1d59697dc8 472986664
chromium-browser_55.0.2883.75.orig.tar.xz
4b4b1ce841dedcdd7ff8fff4242ae2df05b4eb4c 114268
chromium-browser_55.0.2883.75-1.debian.tar.xz
Checksums-Sha256:
12953e90fc00200f678b2ee6915e70d5524952d98042d57037d2a98dfe4bf9d1 3990
chromium-browser_55.0.2883.75-1.dsc
8b4a7109aeb40f1804d584151649a6b2ca70d0da459fe86daeaa0f5f3c6ea358 472986664
chromium-browser_55.0.2883.75.orig.tar.xz
2476b5583ec983fc8ac63e3cfe62deba9c75d9786ac0ff7d25a2fecb58645688 114268
chromium-browser_55.0.2883.75-1.debian.tar.xz
Files:
88eb70a38bb1103f141b95012e1fb856 3990 web optional
chromium-browser_55.0.2883.75-1.dsc
6ea097ad1d73444f40359f54ad9bf396 472986664 web optional
chromium-browser_55.0.2883.75.orig.tar.xz
e9f93b1966aca686e9fc77a040c5cce6 114268 web optional
chromium-browser_55.0.2883.75-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQQzBAEBCgAdFiEEluhy7ASCBulP9FUWuNayzQLW9HMFAlhBf2EACgkQuNayzQLW
9HN2aB/+I48tAl39OnS4twaeRGnf62QSwiMtQaApNaCV5+I2BiMAPDIiKvZnv2+S
AqLcW8ipuWFggCVjqOCe4zidM32n9tvow1feTpbiieTnx4N9fsFVRNz0/rBWpszH
pyd+ZsF3hGy05DOnJ6n8sojBSgLZCKb2o3pOi4IWoygghXvjQ1/HxYxO9DY17Kap
qda0/A0k79DCRs6D9GrsntD+tFSddy4kp9JI40eSQR/LJ5JUqp5haB0oIzhCACPZ
SEQq0bPlbMn/DKOKoYLGARIY+4DRteP6/4scXGbAlcCRhJb09u7kR140RklSqcjW
XrbNtq+udJ/2kcWHtoLtsgr2JoJm6EYtqwdyFIwhmzZ1hRmb9cgYm16M4PGJfMRn
hNRPjS2rLZY9z1TdWEC8WWr7SL9iqCHHCc8nLwN3MiEWr1mCP3gpHzLwY6/XVV3z
ppV7YqA31ArU+04KDA9untfS/R+GLbIPwiS16XaHlHR4NmhVQrJsPw7wVInSIFH8
EMJSc0UfuS36p1G2J5CQODcip27OIk4XuQTYgI/KyDg4mKRD8EuJt6OaZjqTMUDC
SH1AUUj2RoLr0E/iNYkT5tVFaEndkymkUG0dV8mpJWvWnZPPyea/H/MZUINj2rdX
4WlHEdk0vkU0MGX4qHNXOKlDofL7wmUDgENC1bsKmBDZJ/V69pkfhZjLxtXyYa3p
RhfoG8Ld4EMtTtiVnEGm5mNKveLGsOc/1RuY+5bn3XEEvyV6yzsBZs4pYd2+Y9V5
15nOzzIHUsNrmrlJiotCLFANUSCVX/Cum0jhlKFAga2zptp2JNOj2i/B7BazvEE3
gpgIY+tYFFXdSdiYNio4npUGxYb1Z5h8wsz5EDasJQNI7lcSYHA2tTp09o7nr7gK
dBcuKG1FTxgwwF8kCJMlMpczHLdKSrMEL0zu2c9vAjbGd/M74uTdeTfSg+eL76SU
mlp+U6fjQpg3Wu8OF6wjvB13uVGfBUm3YM8CYvu+rNS7LviVYjqzyH7pWtoDAlWY
rWq5Cu6mr5IrND9PtFEwJBgxOz775Xd/tj48YCHdVSFKmB4k+AbUPjIk9SUXTKBx
GjpTaoe99IQ/QnkAojaYp0Q6zsqltpc2hIWyBEU0B0wuPRkKsRjDaPhQaQ1QDBmj
MlU44il45kSMzdFMRNCu6hoVyQVmhDS8pQ9+NJIsYoG9ShVwMg3Sb9KCnTMJ8WZF
NDeNlp2OmEqZZabG8CInnZ2WJnb+xWa/sksLwVJ8vbF6FnKIT5Q8WRpQA+Ji3Ic0
swGI8osrPmAxOGUPsgf3dJTDuIe0rKss2xOSQiCyQ9xe/bZYDlZwPNGX03L8IHpF
sQcqN+fgazKTMNcjvlBt68QSZamd7A==
=2f0l
-----END PGP SIGNATURE-----
--- End Message ---