Your message dated Wed, 25 May 2022 06:50:13 +0000
with message-id <e1ntkqt-00097h...@fasolo.debian.org>
and subject line Bug#1011096: fixed in chromium 102.0.5005.61-1
has caused the Debian Bug report #1011096,
regarding chromium: i386 and armhf packages FTBFS in bullseye
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1011096: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011096
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 101.0.4951.64-1~deb11u1
Severity: normal
X-Debbugs-Cc: bsteinb...@law.harvard.edu
Dear Maintainer,
Chromium 101.0.4951.64-1~deb11u1 has been accepted for bullseye-security, and
the package
is present for the amd64 architecture. I think it has been built for arm64, but
it has not
yet appeared at
http://security.debian.org/debian-security/pool/main/c/chromium/ -- I know
there's a lag between amd64 and arm64 builds, but I think this is longer than
usual.
Please let me know if there's a better place to report this kind of issue.
Thanks!
-- System Information:
Debian Release: 11.3
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: arm64 (aarch64)
Kernel: Linux 5.10.104-linuxkit (SMP w/6 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_RANDSTRUCT
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to
C.UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: unable to detect
Versions of packages chromium depends on:
ii chromium-common 101.0.4951.41-1~deb11u1
ii libasound2 1.2.4-1.1
ii libatk-bridge2.0-0 2.38.0-1
ii libatk1.0-0 2.36.0-2
ii libatomic1 10.2.1-6
ii libatspi2.0-0 2.38.0-4
ii libc6 2.31-13+deb11u3
ii libcairo2 1.16.0-5
ii libcups2 2.3.3op2-3+deb11u1
ii libdbus-1-3 1.12.20-2
ii libdrm2 2.4.104-1
ii libevent-2.1-7 2.1.12-stable-1
ii libexpat1 2.2.10-2+deb11u3
ii libflac8 1.3.3-2+deb11u1
ii libfontconfig1 2.13.1-4.2
ii libfreetype6 2.10.4+dfsg-1
ii libgbm1 20.3.5-1
ii libgcc-s1 10.2.1-6
ii libglib2.0-0 2.66.8-1
ii libgtk-3-0 3.24.24-4+deb11u2
ii libjpeg62-turbo 1:2.0.6-4
ii libjsoncpp24 1.9.4-4
ii liblcms2-2 2.12~rc1-2
ii libminizip1 1.1-8+b1
ii libnspr4 2:4.29-1
ii libnss3 2:3.61-1+deb11u2
ii libopenjp2-7 2.4.0-3
ii libopus0 1.3.1-0.1
ii libpango-1.0-0 1.46.2-3
ii libpng16-16 1.6.37-3
ii libpulse0 14.2-2
ii libre2-9 20210201+dfsg-1
ii libsnappy1v5 1.1.8-1
ii libstdc++6 10.2.1-6
ii libwebp6 0.6.1-2.1
ii libwebpdemux2 0.6.1-2.1
ii libwebpmux3 0.6.1-2.1
ii libx11-6 2:1.7.2-1
ii libxcb1 1.14-3
ii libxcomposite1 1:0.4.5-1
ii libxdamage1 1:1.1.5-2
ii libxext6 2:1.3.3-1.1
ii libxfixes3 1:5.0.3-2
ii libxkbcommon0 1.0.3-2
ii libxml2 2.9.10+dfsg-6.7+deb11u1
ii libxrandr2 2:1.5.1-1
ii libxslt1.1 1.1.34-4
ii zlib1g 1:1.2.11.dfsg-2
Versions of packages chromium recommends:
ii chromium-sandbox 101.0.4951.41-1~deb11u1
Versions of packages chromium suggests:
ii chromium-driver 101.0.4951.41-1~deb11u1
ii chromium-l10n 101.0.4951.41-1~deb11u1
pn chromium-shell <none>
Versions of packages chromium-common depends on:
ii libc6 2.31-13+deb11u3
ii libstdc++6 10.2.1-6
ii libx11-6 2:1.7.2-1
ii libxext6 2:1.3.3-1.1
ii x11-utils 7.7+5
ii xdg-utils 1.1.3-4.1
ii zlib1g 1:1.2.11.dfsg-2
Versions of packages chromium-common recommends:
ii chromium-sandbox 101.0.4951.41-1~deb11u1
ii fonts-liberation 1:1.07.4-11
ii libgl1-mesa-dri 20.3.5-1
ii libu2f-udev 1.1.10-3
ii notification-daemon 3.20.0-4
ii system-config-printer 1.5.14-1
ii upower 0.99.11-2
Versions of packages chromium-driver depends on:
ii libatomic1 10.2.1-6
ii libc6 2.31-13+deb11u3
ii libevent-2.1-7 2.1.12-stable-1
ii libgcc-s1 10.2.1-6
ii libglib2.0-0 2.66.8-1
ii libminizip1 1.1-8+b1
ii libnspr4 2:4.29-1
ii libnss3 2:3.61-1+deb11u2
ii libre2-9 20210201+dfsg-1
ii libstdc++6 10.2.1-6
ii libxcb1 1.14-3
ii zlib1g 1:1.2.11.dfsg-2
Versions of packages chromium-sandbox depends on:
ii libc6 2.31-13+deb11u3
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chromium
Source-Version: 102.0.5005.61-1
Done: Andres Salomon <dilin...@debian.org>
We believe that the bug you reported is fixed in the latest version of
chromium, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andres Salomon <dilin...@debian.org> (supplier of updated chromium package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 25 May 2022 02:09:10 -0400
Source: chromium
Architecture: source
Version: 102.0.5005.61-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Team <chrom...@packages.debian.org>
Changed-By: Andres Salomon <dilin...@debian.org>
Closes: 1011096
Changes:
chromium (102.0.5005.61-1) unstable; urgency=high
.
* New upstream stable release.
- CVE-2022-1853: Use after free in Indexed DB. Reported by Anonymous
- CVE-2022-1854: Use after free in ANGLE.
Reported by SeongHwan Park (SeHwa)
- CVE-2022-1855: Use after free in Messaging. Reported by Anonymous
- CVE-2022-1856: Use after free in User Education. Reported by
Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
- CVE-2022-1857: Insufficient policy enforcement in File System API.
Reported by Daniel Rhea
- CVE-2022-1858: Out of bounds read in DevTools. Reported by EllisVlad
- CVE-2022-1859: Use after free in Performance Manager. Reported by
Guannan Wang (@Keenan7310) of Tencent Security Xuanwu Lab
- CVE-2022-1860: Use after free in UI Foundations.
Reported by @ginggilBesel
- CVE-2022-1861: Use after free in Sharing. Reported by Khalil Zhani
- CVE-2022-1862: Inappropriate implementation in Extensions.
Reported by Alesandro Ortiz
- CVE-2022-1863: Use after free in Tab Groups. Reported by David Erceg
- CVE-2022-1864: Use after free in WebApp Installs.
Reported by Yuntao You (@GraVity0) of Bytedance Wuheng Lab
- CVE-2022-1865: Use after free in Bookmarks.
Reported by Rong Jian of VRI
- CVE-2022-1866: Use after free in Tablet Mode.
Reported by @ginggilBesel
- CVE-2022-1867: Insufficient validation of untrusted input in
Data Transfer. Reported by MichaĆ Bentkowski of Securitum
- CVE-2022-1868: Inappropriate implementation in Extensions API.
Reported by Alesandro Ortiz
- CVE-2022-1869: Type Confusion in V8.
Reported by Man Yue Mo of GitHub Security Lab
- CVE-2022-1870: Use after free in App Service. Reported by
Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
- CVE-2022-1871: Insufficient policy enforcement in File System API.
Reported by Thomas Orlita
- CVE-2022-1872: Insufficient policy enforcement in Extensions API.
Reported by ChaobinZhang
- CVE-2022-1873: Insufficient policy enforcement in COOP.
Reported by NDevTK
- CVE-2022-1874: Insufficient policy enforcement in Safe Browsing.
Reported by hjy79425575
- CVE-2022-1875: Inappropriate implementation in PDF. Reported by NDevTK
- CVE-2022-1876: Heap buffer overflow in DevTools.
Reported by @ginggilBesel
* debian/patches:
- system/jpeg.patch - straight refresh.
- disable/swiftshader.patch - straight refresh.
- disable/swiftshader-2.patch - refresh for upstream dropping of legacy
swiftshader GL stuff; they now use ANGLE.
- disable/angle-perftests.patch - refresh.
- system/jsoncpp.patch - refresh for jsoncpp_no_deprecated_declarations
argument change.
- bullseye/clang11.patch - merge cast-call.patch into it, as well as
dropping additional unsupported clang arguments.
- bullseye/cast-call.patch - drop.
- upstream/dawn-version-fix.patch - add patch to deal w/ FTBFS.
- upstream/blink-ftbfs.patch - another FTBFS patch.
- upstream/nested-nested-nested-nested-nested-nested-regex-patterns.patch -
fix a build failure that only happens with clang + GNU's libstdc++.
- upstream/byteswap-constexpr.patch - add this to fix bullsye builds on
32-bit platforms (closes: #1011096).
* Don't build unneccessary dawn build tests.
Checksums-Sha1:
1755f43c4b66190af33ad27d1baacb7c0eae0fa1 3619 chromium_102.0.5005.61-1.dsc
47331ae6f69d5a5878e82c8292f0725f1bf5346a 601246340
chromium_102.0.5005.61.orig.tar.xz
a012906bef13f69455d036fb4e3a4b451cd438ba 210996
chromium_102.0.5005.61-1.debian.tar.xz
019fb104beaf76e9cdde19590bc3c173cdcf65a0 20021
chromium_102.0.5005.61-1_source.buildinfo
Checksums-Sha256:
abf209fa58d987758fa38e65c56af3cf2250aac2b8ac5367bc69906c061b9655 3619
chromium_102.0.5005.61-1.dsc
9b44f0f42a3b11240bac0b62587994e0fa8f59a27a4e090a3513d62949423690 601246340
chromium_102.0.5005.61.orig.tar.xz
07dfec4e095c8fc8c1ddcdebff11db9c6816744ce6a82159817de1e0aa4a51eb 210996
chromium_102.0.5005.61-1.debian.tar.xz
49c4646085b38eac9d1748e6f07e4430eccfd1ea5d170a26fd56cc90af3be759 20021
chromium_102.0.5005.61-1_source.buildinfo
Files:
bb0a07b0779b303abd143c58319abf1c 3619 web optional chromium_102.0.5005.61-1.dsc
45045d678bc6e6184d7e4e3caf230732 601246340 web optional
chromium_102.0.5005.61.orig.tar.xz
c893a7574832f10afd1642d27a45b62a 210996 web optional
chromium_102.0.5005.61-1.debian.tar.xz
bec25e7836d73a209ab7e56c0b445a67 20021 web optional
chromium_102.0.5005.61-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Bv3A
-----END PGP SIGNATURE-----
--- End Message ---