Your message dated Thu, 14 Sep 2023 03:33:59 +0000
with message-id <e1qgd79-003cuj...@fasolo.debian.org>
and subject line Bug#1051355: fixed in chromium 117.0.5938.62-1
has caused the Debian Bug report #1051355,
regarding chromium: Segmentation fault
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1051355: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051355
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 116.0.5845.180-1
Severity: grave
Justification: Renders package unusable
Dear Maintainer,
Your package is currently unusable, making it impossible to use it.
Please consider fixing this so other users can use it normally.
Thanks.
Just reiterating that the browser doesn't even open in Gnome 44 with Wayland.
The output in the terminal is as follows:
[4562:4562:0906/161027.517475:ERROR:chrome_browser_cloud_management_controller.cc(163)]
Cloud management controller initialization aborted as CBCM is not
enabled.
[4562:4590:0906/161028.019651:ERROR:nss_util.cc(357)] After loading
Root Certs, loaded==false: NSS error code: -8018
[0906/161028.521029:ERROR:elf_dynamic_array_reader.h(64)] tag not found
Falha de segmentação
-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.4.0-3-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8),
LANGUAGE=pt_BR:pt:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages chromium depends on:
ii chromium-common 116.0.5845.180-1
ii libasound2 1.2.9-2
ii libatk-bridge2.0-0 2.49.91-2
ii libatk1.0-0 2.49.91-2
ii libatomic1 13.2.0-2
ii libatspi2.0-0 2.49.91-2
ii libbrotli1 1.0.9-2+b6
ii libc6 2.37-7
ii libcairo2 1.16.0-7
ii libcups2 2.4.2-5
ii libdbus-1-3 1.14.10-1
ii libdouble-conversion3 3.3.0-1
ii libdrm2 2.4.115-1
ii libevent-2.1-7 2.1.12-stable-8
ii libexpat1 2.5.0-2
ii libflac12 1.4.3+ds-2
ii libfontconfig1 2.14.2-4
ii libfreetype6 2.13.2+dfsg-1
ii libgbm1 23.1.6-1
ii libgcc-s1 13.2.0-2
ii libglib2.0-0 2.77.2-1
ii libgtk-3-0 3.24.38-4
ii libjpeg62-turbo 1:2.1.5-2
ii libjsoncpp25 1.9.5-6
ii liblcms2-2 2.14-2
ii libminizip1 1:1.2.13.dfsg-3
ii libnspr4 2:4.35-1.1
ii libnss3 2:3.92-1
ii libopenh264-7 2.3.1+dfsg-3
ii libopenjp2-7 2.5.0-2
ii libopus0 1.4-1
ii libpango-1.0-0 1.51.0+ds-2
ii libpng16-16 1.6.40-1
ii libpulse0 16.1+dfsg1-2+b1
ii libsnappy1v5 1.1.10-1
ii libstdc++6 13.2.0-2
ii libwebp7 1.2.4-0.2
ii libwebpdemux2 1.2.4-0.2
ii libwebpmux3 1.2.4-0.2
ii libwoff1 1.0.2-2
ii libx11-6 2:1.8.6-1
ii libxcb1 1.15-1
ii libxcomposite1 1:0.4.5-1
ii libxdamage1 1:1.1.6-1
ii libxext6 2:1.3.4-1+b1
ii libxfixes3 1:6.0.0-2
ii libxkbcommon0 1.5.0-1
ii libxml2 2.9.14+dfsg-1.3
ii libxnvctrl0 525.125.06-1
ii libxrandr2 2:1.5.2-2+b1
ii libxslt1.1 1.1.35-1
ii xdg-desktop-portal-gnome [xdg-desktop-portal-backend] 43.1-2
ii xdg-desktop-portal-gtk [xdg-desktop-portal-backend] 1.14.1-1
ii zlib1g 1:1.2.13.dfsg-3
Versions of packages chromium recommends:
ii chromium-sandbox 116.0.5845.180-1
Versions of packages chromium suggests:
pn chromium-driver <none>
ii chromium-l10n 116.0.5845.180-1
pn chromium-shell <none>
Versions of packages chromium-common depends on:
ii libc6 2.37-7
ii libgcc-s1 13.2.0-2
ii libjsoncpp25 1.9.5-6
ii libstdc++6 13.2.0-2
ii libx11-6 2:1.8.6-1
ii libxnvctrl0 525.125.06-1
ii x11-utils 7.7+5
ii xdg-utils 1.1.3-4.1
ii zlib1g 1:1.2.13.dfsg-3
Versions of packages chromium-common recommends:
ii chromium-sandbox 116.0.5845.180-1
ii fonts-liberation 1:2.1.5-3
ii gnome-shell [notification-daemon] 44.3-5
ii libgl1-mesa-dri 23.1.6-1
ii libu2f-udev 1.1.10-3
ii system-config-printer 1.5.18-1
ii upower 0.99.20-2
Versions of packages chromium-sandbox depends on:
ii libc6 2.37-7
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chromium
Source-Version: 117.0.5938.62-1
Done: Andres Salomon <dilin...@debian.org>
We believe that the bug you reported is fixed in the latest version of
chromium, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andres Salomon <dilin...@debian.org> (supplier of updated chromium package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 13 Sep 2023 22:26:10 -0400
Source: chromium
Architecture: source
Version: 117.0.5938.62-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team <chrom...@packages.debian.org>
Changed-By: Andres Salomon <dilin...@debian.org>
Closes: 1042111 1051355
Changes:
chromium (117.0.5938.62-1) unstable; urgency=high
.
[ Andres Salomon]
* New upstream stable release.
- CVE-2023-4900: Inappropriate implementation in Custom Tabs.
Reported by Levit Nudi from Kenya.
- CVE-2023-4901: Inappropriate implementation in Prompts.
Reported by Kang Ali.
- CVE-2023-4902: Inappropriate implementation in Input.
Reported by Axel Chong.
- CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs.
Reported by Ahmed ElMasry.
- CVE-2023-4904: Insufficient policy enforcement in Downloads.
Reported by Tudor Enache @tudorhacks.
- CVE-2023-4905: Inappropriate implementation in Prompts.
Reported by Hafiizh.
- CVE-2023-4906: Insufficient policy enforcement in Autofill.
Reported by Ahmed ElMasry.
- CVE-2023-4907: Inappropriate implementation in Intents.
Reported by Mohit Raj (shadow2639) .
- CVE-2023-4908: Inappropriate implementation in Picture in Picture.
Reported by Axel Chong.
- CVE-2023-4909: Inappropriate implementation in Interstitials.
Reported by Axel Chong.
* d/copyright: drop rust, llvm, siso, & cargo binaries.
* d/patches:
- fixes/size.patch: drop, merged upstream.
- fixes/variant.patch: drop, merged upstream.
- fixes/vector.patch: drop, merged upstream.
- upstream/contains.patch: drop, merged upstream.
- upstream/hvec.patch: drop, merged upstream.
- upstream/limits.patch: drop, merged upstream.
- upstream/statelessV4L2.patch: drop, merged upstream.
- fixes/widevine-locations.patch: refresh for minor upstream changes.
- disable/android.patch: drop half the patch.
- disable/catapult.patch: refresh for minor upstream changes.
- disable/tests.patch: refresh for minor upstream changes.
- disable/unrar.patch: refresh for minor upstream changes.
- fixes/material-utils.patch: build fix for clang w/ libstdc++.
- rename fixes/null.patch to fixes/perfetto.patch.
- upstream/memory.patch: build fix for missing header.
- bookworm/struct-ctor.patch: add a bunch more build workarounds for
clang-14.
- bookworm/stringpiece3.patch: another clang-14 StringPiece to
std::string explicit conversion.
- bookworm/typename.patch: add more explicit typename declarations for
clang-14.
- bookworm/structured-binding-scope-bug.patch: add more clang-14 binding
scope workarounds.
- bookworm/initialize-const-ctor.patch: clang-14 workaround to init a
const member inside a struct.
- ppc64le/libaom/0001-Add-ppc64-target-to-libaom.patch: refresh.
- disable/privacy-sandbox.patch: ensure Privacy Sandbox "features" are
off by default.
* Switch to using bundled brotli, as the version in debian is too old.
And so we can drop d/patches/bookworm/brotli.patch, too.
* Switch from clang-14 to clang-16 (closes: #1051355).
.
[ Timothy Pearson ]
* d/patches/ppc64le:
- 0001-Implement-support-for-PPC64-on-Linux.patch: refresh for upstream
changes
- 0001-Add-PPC64-support-for-boringssl.patch: refresh for upstream changes
- 0002-third-party-boringssl-add-generated-files.patch: refresh for
upstream changes
- 0002-third_party-libvpx-Remove-bad-ppc64-config.patch: refresh for
upstream changes
- 0004-third_party-crashpad-port-curl-transport-ppc64.patch: refresh for
upstream changes
- skia-vsx-instructions.patch: refresh for upstream changes
- 0003-third_party-ffmpeg-Add-ppc64-generated-config.patch: regenerate
- 0001-third_party-boringssl-Properly-detect-ppc64le-in-BUI.patch: drop
* d/patches/ungoogled:
- core/ungoogled-chromium/disable-web-environment-integrity.patch: disable
"Web Environment Integrity" trial and remove from build (closes:
#1042111)
Checksums-Sha1:
32adedeb59ce75e97db92be75af9107aff0fd1af 3688 chromium_117.0.5938.62-1.dsc
698cf464e1b71908a8a38e47dce08ecffe3e5d8e 683897300
chromium_117.0.5938.62.orig.tar.xz
390803c101081476d6f3c603fe0cfde9580610c9 385224
chromium_117.0.5938.62-1.debian.tar.xz
2456a17816b899fa9cdb7d3a78e79b888e4f8cee 21189
chromium_117.0.5938.62-1_source.buildinfo
Checksums-Sha256:
0602837529f1174eb163d9e5795042f6bf81cb0e8feeed291e4a2e2db2c9e7de 3688
chromium_117.0.5938.62-1.dsc
f14582a21c933cc5a3b9e3461c87fdb3ff6a41c01d599c44950e0580200d0050 683897300
chromium_117.0.5938.62.orig.tar.xz
d4314538e6f9c65a4ba8582942f905730ff68763bbda54e9edbb03d2b6cbafc6 385224
chromium_117.0.5938.62-1.debian.tar.xz
af04ff757a28945de9f5eae9ed39da18a7adc1a923fe964012cfc782b399324d 21189
chromium_117.0.5938.62-1_source.buildinfo
Files:
2f96f940709be308c5d51126f0a968a8 3688 web optional chromium_117.0.5938.62-1.dsc
e9a68cf8d33b2be80b6a984602cf55b5 683897300 web optional
chromium_117.0.5938.62.orig.tar.xz
1e60b3205b4ab2bf84a061c8b4cfeeaa 385224 web optional
chromium_117.0.5938.62-1.debian.tar.xz
bcb398d219495740744672c53fe4a66e 21189 web optional
chromium_117.0.5938.62-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=fgNo
-----END PGP SIGNATURE-----
--- End Message ---