Your message dated Wed, 17 Oct 2018 03:51:22 +0000
with message-id <e1gccri-000fuv...@fasolo.debian.org>
and subject line Bug#911056: fixed in chromium-browser 70.0.3538.67-1
has caused the Debian Bug report #911056,
regarding chromium,webext-browserpass: impossible to install chromium and 
webext-browserpass together
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
911056: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911056
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium,webext-browserpass
Severity: serious
Justification: 7

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

With chromium 70.0.3538.54-1 and webext-browserpass 2.0.11+dfsg-2 installed,
attempting to upgrade to chromium 70.0.3538.54-2 fails:

Gør klar til at udpakke .../chromium_70.0.3538.54-2_amd64.deb ...
Udpakker chromium (70.0.3538.54-2) over (70.0.3538.54-1) ...
dpkg: advarsel: chromium: konfigurationsfil '/etc/chromium' er hverken en 
almindelig fil eller symbolsk lænke (= '/etc/chromium')
dpkg: fejl under behandling af arkivet 
/var/cache/apt/archives/chromium_70.0.3538.54-2_amd64.deb (--unpack):
 forsøger at overskrive kataloget '/etc/chromium' i pakken webext-browserpass 
2.0.11+dfsg-2 med ikke-katalog
dpkg-deb: fejl: indsæt subprocess was killed by signal (Kanalen blev brudt)
dpkg: overvejer at afkonfigurere chromium, som ville være i konflikt med 
installation af chromium-common ...
dpkg: ja, vil afkonfigurere chromium (ødelagt af chromium-common)
Gør klar til at udpakke .../chromium-common_70.0.3538.54-2_amd64.deb ...
Afkonfigurerer chromium (70.0.3538.54-1) ...
Udpakker chromium-common (70.0.3538.54-2) over (70.0.3538.54-1) ...
Der opstod fejl under behandlingen:
 /var/cache/apt/archives/chromium_70.0.3538.54-2_amd64.deb
needrestart is being skipped since dpkg has failed
E: Sub-process /usr/bin/dpkg returned an error code (1)
Sætter chromium-common (70.0.3538.54-2) op ...
dpkg: afhængighedsproblemer forhindrer konfiguration af chromium:
 chromium afhænger af chromium-common (= 70.0.3538.54-1); men:
  Version af chromium-common på systemet er 70.0.3538.54-2.
 chromium-common (70.0.3538.54-2) ødelægger chromium (<< 70.0.3538.54-2) og er 
installeret.
  Versionen af chromium, der skal sætte op, er 70.0.3538.54-1.

Above is in danish, but I guess the essence is noticable for english speakers:
/etc/chromium is somehow "owned" by both packages,
which causes trouble (now that chromium adds a conffile, I guess).


 - Jonas

-----BEGIN PGP SIGNATURE-----
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=MA/A
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Source: chromium-browser
Source-Version: 70.0.3538.67-1

We believe that the bug you reported is fixed in the latest version of
chromium-browser, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 911...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Gilbert <mgilb...@debian.org> (supplier of updated chromium-browser 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 16 Oct 2018 12:36:22 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromium-shell chromium-driver chromium-common
Architecture: source
Version: 70.0.3538.67-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Team <chromium-brow...@packages.debian.org>
Changed-By: Michael Gilbert <mgilb...@debian.org>
Description:
 chromium   - web browser
 chromium-common - web browser - common resources used by the chromium packages
 chromium-driver - web browser - WebDriver support
 chromium-l10n - web browser - language packs
 chromium-shell - web browser - minimal shell
Closes: 911056
Changes:
 chromium-browser (70.0.3538.67-1) unstable; urgency=medium
 .
   * New upstream stable release.
     - CVE-2018-17462: Sandbox escape in AppCache. Reported by Ned Williamson
       and Niklas Baumstark
     - CVE-2018-17463: Remote code execution in V8. Reported by Ned Williamson
       and Niklas Baumstark
     - Heap buffer overflow in Little CMS in PDFium. Reported by Quang Nguyễn
     - CVE-2018-17464: URL spoof in Omnibox. Reported by xisigr
     - CVE-2018-17465: Use after free in V8. Reported by Lin Zuojian
     - CVE-2018-17466: Memory corruption in Angle. Reported by Omair
     - CVE-2018-17467: URL spoof in Omnibox. Reported by Khalil Zhani
     - CVE-2018-17468: Cross-origin URL disclosure in Blink. Reported by James
       Lee
     - CVE-2018-17469: Heap buffer overflow in PDFium. Reported by Zhen Zhou
     - CVE-2018-17470: Memory corruption in GPU Internals. Reported by Zhe Jin
     - CVE-2018-17471: Security UI occlusion in full screen mode. Reported by
       Lnyas Zhang
     - CVE-2018-17473: URL spoof in Omnibox. Reported by Khalil Zhani
     - CVE-2018-17474: Use after free in Blink. Reported by Zhe Jin
     - CVE-2018-17475: URL spoof in Omnibox. Reported by Vladimir Metnew
     - CVE-2018-17476: Security UI occlusion in full screen mode. Reported by
       Khalil Zhani
     - CVE-2018-5179: Lack of limits on update() in ServiceWorker. Reported by
       Yannic Bonenberger
     - CVE-2018-17477: UI spoof in Extensions. Reported by Aaron Muir Hamilton
   * Fix build failure on i386.
   * Fix installation path of the master preferences file (closes: #911056).
Checksums-Sha1:
 4109b0cfd203feef4bb2be1c8a5e09d6905ca780 4205 
chromium-browser_70.0.3538.67-1.dsc
 7a36f291c4b36b7dec2ef8b9e82e20153deae1e8 205802572 
chromium-browser_70.0.3538.67.orig.tar.xz
 1729498a18276a0f07461513f720c57138497b8e 151932 
chromium-browser_70.0.3538.67-1.debian.tar.xz
 cdaea1dbb514e7f1648948c35aeb9868741f73aa 18763 
chromium-browser_70.0.3538.67-1_source.buildinfo
Checksums-Sha256:
 85c8ceee7477767b1d300946096e4208ad20f58e179a2c7f586976ef822f5819 4205 
chromium-browser_70.0.3538.67-1.dsc
 8b5a3ec76bb4f158e5716d5782df746cf8f4b737126c9ba0b47d1962d586ffa7 205802572 
chromium-browser_70.0.3538.67.orig.tar.xz
 3188f140645fc11d36ac00d0e0668c9160c4030342f60d53cf0cda6428b6113d 151932 
chromium-browser_70.0.3538.67-1.debian.tar.xz
 f2a0a415028818cdfb8ee85730fa320eb304149a12ab51fe9f769ef6fd3aa08b 18763 
chromium-browser_70.0.3538.67-1_source.buildinfo
Files:
 ce9fb5e1347c8733ee068892aa2281a0 4205 web optional 
chromium-browser_70.0.3538.67-1.dsc
 e948e133f96a511a2ec1aaa7a18955e8 205802572 web optional 
chromium-browser_70.0.3538.67.orig.tar.xz
 e7bfccdaa9cd2a61b7a69a7aa994f52a 151932 web optional 
chromium-browser_70.0.3538.67-1.debian.tar.xz
 bfeb8b500a5b0bbbd7a5e188f9c0c56d 18763 web optional 
chromium-browser_70.0.3538.67-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=T8r1
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to