Your message dated Sun, 19 Feb 2012 22:37:53 +0000
with message-id <e1rzfod-0000jo...@franck.debian.org>
and subject line Bug#660159: fixed in chromium-browser 17.0.963.56~r121963-1
has caused the Debian Bug report #660159,
regarding chromium: Hardcoded dependency on libvpx0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
660159: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660159
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 16.0.912.77~r118311-1
Severity: serious
Justification: Uninstallable
Hi,
this is totally fubar:
| Package: chromium
| Architecture: i386 amd64 armel
| Depends: ${shlibs:Depends}, ${misc:Depends},
| libnss3-1d (>= 3.12.3),
| libvpx0 (>= 0.9.6),
| xdg-utils,
| chromium-inspector
Especially since we now have #660034 in progress, so the chromium binNMU
changed nothing in chromium's dependencies. I'm going to ask for a
libvpx decruft, meaning libvpx0 goes away, meaning chromium gets
uninstallable in sid (and libvpx plus the rebuilt packages can migrate).
Mraw,
KiBi.
--- End Message ---
--- Begin Message ---
Source: chromium-browser
Source-Version: 17.0.963.56~r121963-1
We believe that the bug you reported is fixed in the latest version of
chromium-browser, which is due to be installed in the Debian FTP archive:
chromium-browser-dbg_17.0.963.56~r121963-1_all.deb
to main/c/chromium-browser/chromium-browser-dbg_17.0.963.56~r121963-1_all.deb
chromium-browser-inspector_17.0.963.56~r121963-1_all.deb
to
main/c/chromium-browser/chromium-browser-inspector_17.0.963.56~r121963-1_all.deb
chromium-browser-l10n_17.0.963.56~r121963-1_all.deb
to main/c/chromium-browser/chromium-browser-l10n_17.0.963.56~r121963-1_all.deb
chromium-browser_17.0.963.56~r121963-1.debian.tar.gz
to
main/c/chromium-browser/chromium-browser_17.0.963.56~r121963-1.debian.tar.gz
chromium-browser_17.0.963.56~r121963-1.dsc
to main/c/chromium-browser/chromium-browser_17.0.963.56~r121963-1.dsc
chromium-browser_17.0.963.56~r121963-1_all.deb
to main/c/chromium-browser/chromium-browser_17.0.963.56~r121963-1_all.deb
chromium-browser_17.0.963.56~r121963.orig.tar.bz2
to main/c/chromium-browser/chromium-browser_17.0.963.56~r121963.orig.tar.bz2
chromium-dbg_17.0.963.56~r121963-1_amd64.deb
to main/c/chromium-browser/chromium-dbg_17.0.963.56~r121963-1_amd64.deb
chromium-inspector_17.0.963.56~r121963-1_all.deb
to main/c/chromium-browser/chromium-inspector_17.0.963.56~r121963-1_all.deb
chromium-l10n_17.0.963.56~r121963-1_all.deb
to main/c/chromium-browser/chromium-l10n_17.0.963.56~r121963-1_all.deb
chromium_17.0.963.56~r121963-1_amd64.deb
to main/c/chromium-browser/chromium_17.0.963.56~r121963-1_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 660...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Giuseppe Iuculano <iucul...@debian.org> (supplier of updated chromium-browser
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sun, 19 Feb 2012 20:29:17 +0100
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n
chromium-browser-inspector chromium chromium-dbg chromium-l10n
chromium-inspector
Architecture: source all amd64
Version: 17.0.963.56~r121963-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Maintainers
<pkg-chromium-ma...@lists.alioth.debian.org>
Changed-By: Giuseppe Iuculano <iucul...@debian.org>
Description:
chromium - Google's open source chromium web browser
chromium-browser - Chromium browser - transitional dummy package
chromium-browser-dbg - chromium-browser debug symbols transitional dummy
package
chromium-browser-inspector - page inspector for the chromium-browser -
transitional dummy pack
chromium-browser-l10n - chromium-browser language packages - transitional
dummy package
chromium-dbg - Debugging symbols for the chromium web browser
chromium-inspector - page inspector for the chromium browser
chromium-l10n - chromium-browser language packages
Closes: 632119 642760 660159
Changes:
chromium-browser (17.0.963.56~r121963-1) unstable; urgency=high
.
[ Michael Gilbert ]
* [5c3bb1e] remove duplicate dependency on libgconf2-dev
* [a978400] exclude .git directories from upstream tarball
* [d29d859] add descriptions to patches
* [52af88b] update debian/copyright field to adhere to latest DEP5
specification
* [f3b7ba9] update patches for chromium 17
* [4634823] install content_resources.pak
* [e7883c9] depend on libv8 >= 3.7
* [dd4fe7d] use pulseaudio
.
[ Giuseppe Iuculano ]
* [826649a] Fix FTBFS on armel and added armhf.
Thanks to Riku Voipio (Closes: #632119)
* [e9ac7ab] Link against system vpx (Closes: #642760)
* [b88a849] Remove ardcoded dependency on libvpx0 (Closes: #660159)
* [9dec8df] Updated patches
* New stable release:
- Medium CVE-2011-3016: Read-after-free with counter nodes.
Credit to miaubiz.
- High CVE-2011-3017: Possible use-after-free in database
handling. Credit to miaubiz.
- High CVE-2011-3018: Heap overflow in path rendering. Credit
to Aki Helin of OUSPG.
- High CVE-2011-3019: Heap buffer overflow in MKV handling. Credit to
Google Chrome Security Team (scarybeasts) and Mateusz Jurczyk / Gynvael
Coldwind of the Google Security Team.
- Medium CVE-2011-3020: Native client validator error. Credit to Nick
Bray of the Chromium development community.
- High CVE-2011-3021: Use-after-free in subframe loading.
Credit to Arthur Gerkis.
- Medium CVE-2011-3022: Inappropriate use of http for translation
script. Credit to Google Chrome Security Team (Jorge Obes).
- Medium CVE-2011-3023: Use-after-free with drag and drop.
Credit to pa_kt.
- Low CVE-2011-3024: Browser crash with empty x509 certificate. Credit
to chrometot.
- Medium CVE-2011-3025: Out-of-bounds read in h.264 parsing.
Credit to Sławomir Błażek.
- High CVE-2011-3026: Integer overflow / truncation in libpng.
Credit to Jüri Aedla.
- High CVE-2011-3027: Bad cast in column handling. Credit to
miaubiz
- Low CVE-2011-3953: Avoid clipboard monitoring after paste event.
Credit to Daniel Cheng of the Chromium development community.
- Low CVE-2011-3954: Crash with excessive database usage. Credit to
Collin Payne.
- High CVE-2011-3955: Crash aborting an IndexDB transaction. Credit to
David Grogan of the Chromium development community.
- Low CVE-2011-3956: Incorrect handling of sandboxed origins inside
extensions. Credit to Devdatta Akhawe, UC Berkeley.
- High CVE-2011-3958: Bad casts with column spans. Credit to
miaubiz.
- High CVE-2011-3959: Buffer overflow in locale handling.
Credit to Aki Helin of OUSPG.
- Medium CVE-2011-3960: Out-of-bounds read in audio decoding.
Credit to Aki Helin of OUSPG.
- Critical CVE-2011-3961: Race condition after crash of utility
process. Credit to Shawn Goertzen.
- Medium CVE-2011-3962: Out-of-bounds read in path clipping.
Credit to Aki Helin of OUSPG.
- Low CVE-2011-3964: URL bar confusion after drag + drop. Credit to
Code Audit Labs of VulnHunt.com.
- Low CVE-2011-3965: Crash in signature check. Credit to Sławomir
Błażek.
- High CVE-2011-3966: Use-after-free in stylesheet error
handling. Credit to Aki Helin of OUSPG.
- Low CVE-2011-3967: Crash with unusual certificate. Credit to Ben
Carrillo.
- High CVE-2011-3968: Use-after-free in CSS handling. Credit to
Arthur Gerkis.
- High CVE-2011-3969: Use-after-free in SVG layout. Credit to
Arthur Gerkis.
- Medium CVE-2011-3970: Out-of-bounds read in libxslt. Credit to
Aki Helin of OUSPG.
- High CVE-2011-3971: Use-after-free with mousemove events.
Credit to Arthur Gerkis.
- Medium CVE-2011-3972: Out-of-bounds read in shader translator. Credit
to Google Chrome Security Team (Inferno).
Checksums-Sha1:
5eaa8a77ba1abc5c0ea87978bad00ef91b2e3fb2 3013
chromium-browser_17.0.963.56~r121963-1.dsc
032be8098e70247eca2f59257e2bc76dcf2da9d3 345196579
chromium-browser_17.0.963.56~r121963.orig.tar.bz2
99f29d5509e1ed27e2dba725ae093fe2dd093df8 241655
chromium-browser_17.0.963.56~r121963-1.debian.tar.gz
283cc6c60911dcfbdd759bf4181c370a3d24effb 178544
chromium-browser_17.0.963.56~r121963-1_all.deb
4de8d472a895cd06446c1025b8376888215c3c80 177680
chromium-browser-dbg_17.0.963.56~r121963-1_all.deb
59acd34400a317e1be89896929bb6610913eb2fa 177822
chromium-browser-l10n_17.0.963.56~r121963-1_all.deb
274c31bd2b160306ac5118ba7928651ce5a5b55a 177696
chromium-browser-inspector_17.0.963.56~r121963-1_all.deb
1fe1ea41e9dbfe92e4773025ce102b41d8a7af56 2887272
chromium-l10n_17.0.963.56~r121963-1_all.deb
77ab842967d15b5d075bdebcd36e185ca904141f 820660
chromium-inspector_17.0.963.56~r121963-1_all.deb
58f48c229e02c8ceb0caa80d0f1a5a9fd77ce536 27794408
chromium_17.0.963.56~r121963-1_amd64.deb
586f74e4251f8a6c60b955456b20ac1b20e32b66 430908014
chromium-dbg_17.0.963.56~r121963-1_amd64.deb
Checksums-Sha256:
d646814f65d48009108afa869a75d4891b2dbd28f1e6a161051c9c9e32058588 3013
chromium-browser_17.0.963.56~r121963-1.dsc
fa62474c876d535d3efdc4f700c4e0000be6bd0b96cedc9e0cb6a1ef084c7732 345196579
chromium-browser_17.0.963.56~r121963.orig.tar.bz2
c29e4d1dce79537720845a76ab5958e06d31dd30539d0f9fd13cbb798084f088 241655
chromium-browser_17.0.963.56~r121963-1.debian.tar.gz
bcdb28aeaa0ce4e81b1d62588aa6d1669d258d69541c3675e0f80bcfb661c6c9 178544
chromium-browser_17.0.963.56~r121963-1_all.deb
69a611b04c40b916472d94310823132e7cd821125ecf2e4534b167731dc02dba 177680
chromium-browser-dbg_17.0.963.56~r121963-1_all.deb
73d5c636c5c44bf072beaf8a7baee5fd86998fd5e065702ab5fadb0d291b3bba 177822
chromium-browser-l10n_17.0.963.56~r121963-1_all.deb
fd0c2aed905ade35ee41edd441383b00c27b48e1a1b7cea0a1def8e71c3c1216 177696
chromium-browser-inspector_17.0.963.56~r121963-1_all.deb
c489311f3cbb00c4673f21116b5e41ad26ed6fe489f7fc527b30b8f7837b5e89 2887272
chromium-l10n_17.0.963.56~r121963-1_all.deb
ac1d3f44dacb0f79d6de7775b1fab795582424269884b8b894826079d6c2ce44 820660
chromium-inspector_17.0.963.56~r121963-1_all.deb
8510973d19186b09e6cfc0845cf6e8048a63aae6c6b259cf0f448dceb28b1929 27794408
chromium_17.0.963.56~r121963-1_amd64.deb
b710bb9f242a962e3f234c6d40c6dcacbb7e4842bba87c41d3f4dd158735b939 430908014
chromium-dbg_17.0.963.56~r121963-1_amd64.deb
Files:
db875f96358dba78a64c10530099ec60 3013 web optional
chromium-browser_17.0.963.56~r121963-1.dsc
d0b9731661f1f67731539e173192a65e 345196579 web optional
chromium-browser_17.0.963.56~r121963.orig.tar.bz2
28b4dad7b06a3a56923a7b2290b6733e 241655 web optional
chromium-browser_17.0.963.56~r121963-1.debian.tar.gz
0c8a7559f90f7b1fe751db0c47350572 178544 oldlibs optional
chromium-browser_17.0.963.56~r121963-1_all.deb
702f4e9c0d104a0f7738ad4d63c117dd 177680 oldlibs extra
chromium-browser-dbg_17.0.963.56~r121963-1_all.deb
4e4b932ba3a3bf3b24c7c16329135fb1 177822 oldlibs optional
chromium-browser-l10n_17.0.963.56~r121963-1_all.deb
c8e065456c69b961f170671429b63970 177696 oldlibs optional
chromium-browser-inspector_17.0.963.56~r121963-1_all.deb
bc48fbdd9ccb41e94c1badb911778536 2887272 web optional
chromium-l10n_17.0.963.56~r121963-1_all.deb
ba3fd10d5fe0eea93656b73e95022da3 820660 web optional
chromium-inspector_17.0.963.56~r121963-1_all.deb
9cebb949d89be34b1af8d7aca0b36cc6 27794408 web optional
chromium_17.0.963.56~r121963-1_amd64.deb
b5d8d9f4c36b64ec68cb4aea0dac9d29 430908014 debug extra
chromium-dbg_17.0.963.56~r121963-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk9BdqcACgkQNxpp46476aomjwCeLz0KK9r1eur3WTZ0uSaNjSEd
44EAni5tT3/GnPlI2vZ8y3Avi75AgXFz
=3DtQ
-----END PGP SIGNATURE-----
--- End Message ---