Your message dated Wed, 17 Oct 2018 03:51:22 +0000
with message-id <e1gccri-000fuv...@fasolo.debian.org>
and subject line Bug#911056: fixed in chromium-browser 70.0.3538.67-1
has caused the Debian Bug report #911056,
regarding chromium: Chromium upgrade conflicts with plasma-browser-integration
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
911056: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911056
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 70.0.3538.54-1
Severity: normal
Dear Maintainer,
Ran update today and Chromium is broke with this error:
dpkg: warning: chromium: conffile '/etc/chromium' is not a plain file or
symlink (= '/etc/chromium')
dpkg: error processing archive
/var/cache/apt/archives/chromium_70.0.3538.54-2_amd64.deb (--unpack):
trying to overwrite directory '/etc/chromium' in package plasma-browser-
integration 5.13.5-1 with nondirectory
dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.18.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_NG.UTF-8, LC_CTYPE=en_NG.UTF-8 (charmap=UTF-8),
LANGUAGE=en_NG:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages chromium depends on:
iu chromium-common 70.0.3538.54-2
ii libasound2 1.1.6-1
ii libatk-bridge2.0-0 2.30.0-2
ii libatk1.0-0 2.30.0-1
ii libatomic1 8.2.0-7
ii libavcodec58 10:4.0.2-dmo3
ii libavformat58 10:4.0.2-dmo3
ii libavutil56 10:4.0.2-dmo3
ii libc6 2.27-6
ii libcairo-gobject2 1.15.12-1
ii libcairo2 1.15.12-1
ii libcups2 2.2.8-5
ii libdbus-1-3 1.12.10-1
ii libdrm2 2.4.95-1
ii libevent-2.1-6 2.1.8-stable-4
ii libexpat1 2.2.6-1
ii libflac8 1.3.2-3
ii libfontconfig1 2.13.1-1
ii libfreetype6 2.8.1-2
ii libgcc1 1:8.2.0-7
ii libgdk-pixbuf2.0-0 2.38.0+dfsg-6
ii libglib2.0-0 2.58.1-2
ii libgtk-3-0 3.24.1-2
ii libharfbuzz0b 1.9.0-1
ii libicu60 60.2-6
ii libjpeg62-turbo 1:1.5.2-2+b1
ii liblcms2-2 2.9-3
ii libminizip1 1.1-8+b1
ii libnspr4 2:4.20-1
ii libnss3 2:3.39-1
ii libopenjp2-7 2.3.0-1
ii libopus0 1.3~beta+20180518-1
ii libpango-1.0-0 1.42.4-3
ii libpangocairo-1.0-0 1.42.4-3
ii libpci3 1:3.5.2-1
ii libpng16-16 1.6.34-2
ii libpulse0 12.2-2
ii libre2-4 20180901+dfsg-1
ii libsnappy1v5 1.1.7-1
ii libstdc++6 8.2.0-7
ii libvpx5 1.7.0-3
ii libwebp6 0.6.1-2
ii libwebpdemux2 0.6.1-2
ii libwebpmux3 0.6.1-2
ii libx11-6 2:1.6.7-1
ii libx11-xcb1 2:1.6.7-1
ii libxcb1 1.13.1-1
ii libxcomposite1 1:0.4.4-2
ii libxcursor1 1:1.1.15-1
ii libxdamage1 1:1.1.4-3
ii libxext6 2:1.3.3-1+b2
ii libxfixes3 1:5.0.3-1
ii libxi6 2:1.7.9-1
ii libxml2 2.9.4+dfsg1-7+b1
ii libxrandr2 2:1.5.1-1
ii libxrender1 1:0.9.10-1
ii libxslt1.1 1.1.32-2
ii libxss1 1:1.2.3-1
ii libxtst6 2:1.2.3-1
ii zlib1g 1:1.2.11.dfsg-1
chromium recommends no packages.
Versions of packages chromium suggests:
pn chromium-driver <none>
pn chromium-l10n <none>
pn chromium-shell <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chromium-browser
Source-Version: 70.0.3538.67-1
We believe that the bug you reported is fixed in the latest version of
chromium-browser, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 911...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Gilbert <mgilb...@debian.org> (supplier of updated chromium-browser
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 16 Oct 2018 12:36:22 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromium-shell chromium-driver chromium-common
Architecture: source
Version: 70.0.3538.67-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Team <chromium-brow...@packages.debian.org>
Changed-By: Michael Gilbert <mgilb...@debian.org>
Description:
chromium - web browser
chromium-common - web browser - common resources used by the chromium packages
chromium-driver - web browser - WebDriver support
chromium-l10n - web browser - language packs
chromium-shell - web browser - minimal shell
Closes: 911056
Changes:
chromium-browser (70.0.3538.67-1) unstable; urgency=medium
.
* New upstream stable release.
- CVE-2018-17462: Sandbox escape in AppCache. Reported by Ned Williamson
and Niklas Baumstark
- CVE-2018-17463: Remote code execution in V8. Reported by Ned Williamson
and Niklas Baumstark
- Heap buffer overflow in Little CMS in PDFium. Reported by Quang Nguyễn
- CVE-2018-17464: URL spoof in Omnibox. Reported by xisigr
- CVE-2018-17465: Use after free in V8. Reported by Lin Zuojian
- CVE-2018-17466: Memory corruption in Angle. Reported by Omair
- CVE-2018-17467: URL spoof in Omnibox. Reported by Khalil Zhani
- CVE-2018-17468: Cross-origin URL disclosure in Blink. Reported by James
Lee
- CVE-2018-17469: Heap buffer overflow in PDFium. Reported by Zhen Zhou
- CVE-2018-17470: Memory corruption in GPU Internals. Reported by Zhe Jin
- CVE-2018-17471: Security UI occlusion in full screen mode. Reported by
Lnyas Zhang
- CVE-2018-17473: URL spoof in Omnibox. Reported by Khalil Zhani
- CVE-2018-17474: Use after free in Blink. Reported by Zhe Jin
- CVE-2018-17475: URL spoof in Omnibox. Reported by Vladimir Metnew
- CVE-2018-17476: Security UI occlusion in full screen mode. Reported by
Khalil Zhani
- CVE-2018-5179: Lack of limits on update() in ServiceWorker. Reported by
Yannic Bonenberger
- CVE-2018-17477: UI spoof in Extensions. Reported by Aaron Muir Hamilton
* Fix build failure on i386.
* Fix installation path of the master preferences file (closes: #911056).
Checksums-Sha1:
4109b0cfd203feef4bb2be1c8a5e09d6905ca780 4205
chromium-browser_70.0.3538.67-1.dsc
7a36f291c4b36b7dec2ef8b9e82e20153deae1e8 205802572
chromium-browser_70.0.3538.67.orig.tar.xz
1729498a18276a0f07461513f720c57138497b8e 151932
chromium-browser_70.0.3538.67-1.debian.tar.xz
cdaea1dbb514e7f1648948c35aeb9868741f73aa 18763
chromium-browser_70.0.3538.67-1_source.buildinfo
Checksums-Sha256:
85c8ceee7477767b1d300946096e4208ad20f58e179a2c7f586976ef822f5819 4205
chromium-browser_70.0.3538.67-1.dsc
8b5a3ec76bb4f158e5716d5782df746cf8f4b737126c9ba0b47d1962d586ffa7 205802572
chromium-browser_70.0.3538.67.orig.tar.xz
3188f140645fc11d36ac00d0e0668c9160c4030342f60d53cf0cda6428b6113d 151932
chromium-browser_70.0.3538.67-1.debian.tar.xz
f2a0a415028818cdfb8ee85730fa320eb304149a12ab51fe9f769ef6fd3aa08b 18763
chromium-browser_70.0.3538.67-1_source.buildinfo
Files:
ce9fb5e1347c8733ee068892aa2281a0 4205 web optional
chromium-browser_70.0.3538.67-1.dsc
e948e133f96a511a2ec1aaa7a18955e8 205802572 web optional
chromium-browser_70.0.3538.67.orig.tar.xz
e7bfccdaa9cd2a61b7a69a7aa994f52a 151932 web optional
chromium-browser_70.0.3538.67-1.debian.tar.xz
bfeb8b500a5b0bbbd7a5e188f9c0c56d 18763 web optional
chromium-browser_70.0.3538.67-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=T8r1
-----END PGP SIGNATURE-----
--- End Message ---