Your message dated Wed, 13 Jan 2021 16:17:47 +0100
with message-id <20210113151747.2nrr6gnduszq3bp2@bogus>
and subject line Bug#979443: fixed in chromium 87.0.4280.141-0.1
has caused the Debian Bug report #979443,
regarding chromium: desktop GUI locks up as Xorg process goes to 100%
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
979443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979443
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 87.0.4280.88-0.4~deb10u1
Severity: grave
Tags: a11y
Justification: renders package unusable

Dear Maintainer,

Subsequent to an upgrade from 83.0.4103.116-1~deb10u3 to 87.0.4280.88-0.4~deb10u1, the desktop GUI randomly freezes, including the clock. This occurred three times over the course of two days. Doing a ssh from another machine, and then running top, showed the Xorg process pegged at 100%. Killing just the chromium process did not resolve the locking problem, and the only way to recover was to kill all processes for the GUI user. Chromium was rolled back to 83.0.4103.116-1~deb10u3 and there have been no freezes in over two days.


-- System Information:
Debian Release: 10.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-13-amd64 (SMP w/16 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages chromium depends on:
ii  chromium-common      87.0.4280.88-0.4~deb10u1
ii  libasound2           1.1.8-1
ii  libatk-bridge2.0-0   2.30.0-5
ii  libatk1.0-0          2.30.0-2
ii  libatspi2.0-0        2.30.0-7
ii  libavcodec58         7:4.1.6-1~deb10u1
ii  libavformat58        7:4.1.6-1~deb10u1
ii  libavutil56          7:4.1.6-1~deb10u1
ii  libc6                2.28-10
ii  libcairo2            1.16.0-4
ii  libcups2             2.2.10-6+deb10u4
ii  libdbus-1-3          1.12.20-0+deb10u1
ii  libdrm2              2.4.97-1
ii  libevent-2.1-6       2.1.8-stable-4
ii  libexpat1            2.2.6-2+deb10u1
ii  libflac8             1.3.2-3
ii  libfontconfig1       2.13.1-2
ii  libfreetype6         2.9.1-3+deb10u2
ii  libgbm1              18.3.6-2+deb10u1
ii  libgcc1              1:8.3.0-6
ii  libgdk-pixbuf2.0-0   2.38.1+dfsg-1
ii  libglib2.0-0         2.58.3-2+deb10u2
ii  libgtk-3-0           3.24.5-1
ii  libharfbuzz0b        2.3.1-1
ii  libicu63             63.1-6+deb10u1
ii  libjpeg62-turbo      1:1.5.2-2+deb10u1
ii  libjsoncpp1          1.7.4-3
ii  liblcms2-2           2.9-3
ii  libminizip1          1.1-8+b1
ii  libnspr4             2:4.20-1
ii  libnss3              2:3.42.1-1+deb10u3
ii  libopenjp2-7         2.3.0-2+deb10u1
ii  libopus0             1.3-1
ii  libpango-1.0-0       1.42.4-8~deb10u1
ii  libpangocairo-1.0-0  1.42.4-8~deb10u1
ii  libpng16-16          1.6.36-6
ii  libpulse0            12.2-4+deb10u1
ii  libre2-5             20190101+dfsg-2
ii  libsnappy1v5         1.1.7-1
ii  libstdc++6           8.3.0-6
ii  libvpx5              1.7.0-3+deb10u1
ii  libwebp6             0.6.1-2
ii  libwebpdemux2        0.6.1-2
ii  libwebpmux3          0.6.1-2
ii  libx11-6             2:1.6.7-1+deb10u1
ii  libx11-xcb1          2:1.6.7-1+deb10u1
ii  libxcb-dri3-0        1.13.1-2
ii  libxcb1              1.13.1-2
ii  libxcomposite1       1:0.4.4-2
ii  libxcursor1          1:1.1.15-2
ii  libxdamage1          1:1.1.4-3+b3
ii  libxext6             2:1.3.3-1+b2
ii  libxfixes3           1:5.0.3-1
ii  libxi6               2:1.7.9-1
ii  libxml2              2.9.4+dfsg1-7+deb10u1
ii  libxrandr2           2:1.5.1-1
ii  libxrender1          1:0.9.10-1
ii  libxslt1.1           1.1.32-2.2~deb10u1
ii  libxss1              1:1.2.3-1
ii  libxtst6             2:1.2.3-1
ii  zlib1g               1:1.2.11.dfsg-1

Versions of packages chromium recommends:
ii  chromium-sandbox  87.0.4280.88-0.4~deb10u1

Versions of packages chromium suggests:
pn  chromium-driver  <none>
pn  chromium-l10n    <none>
pn  chromium-shell   <none>

Versions of packages chromium-common depends on:
ii  x11-utils  7.7+4
ii  xdg-utils  1.1.3-1+deb10u1

Versions of packages chromium-common recommends:
ii  chromium-sandbox                                87.0.4280.88-0.4~deb10u1
ii  fonts-liberation                                1:1.07.4-9
ii  libgl1-mesa-dri                                 18.3.6-2+deb10u1
ii  libu2f-udev                                     1.1.9-1
ii  mate-notification-daemon [notification-daemon]  1.20.2-1
ii  notification-daemon                             3.20.0-4
ii  upower                                          0.99.10-1

Versions of packages chromium-sandbox depends on:
ii  libc6  2.28-10

-- no debconf information

--- End Message ---
--- Begin Message ---
Looks like this bug was accidentally excluded from the changelog,
which only mentionned #979135.


Best,
  nicoo

----- Forwarded message from Debian FTP Masters 
<ftpmas...@ftp-master.debian.org> -----

Date: Sun, 10 Jan 2021 18:49:23 +0000
From: Debian FTP Masters <ftpmas...@ftp-master.debian.org>
To: 979135-cl...@bugs.debian.org
Subject: Bug#979135: fixed in chromium 87.0.4280.141-0.1

Source: chromium
Source-Version: 87.0.4280.141-0.1
Done: Michel Le Bihan <mic...@lebihan.pl>

We believe that the bug you reported is fixed in the latest version of
chromium, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 979...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michel Le Bihan <mic...@lebihan.pl> (supplier of updated chromium package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 09 Jan 2021 11:24:58 +0100
Source: chromium
Architecture: source
Version: 87.0.4280.141-0.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Team <chrom...@packages.debian.org>
Changed-By: Michel Le Bihan <mic...@lebihan.pl>
Closes: 979135 979520
Changes:
 chromium (87.0.4280.141-0.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * New upstream security release (closes: 979520).
     - CVE-2021-21106: Use after free in autofill. Reported by Weipeng Jiang
       @Krace from Codesafe Team of Legendsec at Qi'anxin Group
     - CVE-2021-21107: Use after free in drag and drop. Reported by Leecraso and
       Guang Gong of 360 Alpha Lab
     - CVE-2021-21108: Use after free in media. Reported by Leecraso and Guang
       Gong of 360 Alpha Lab
     - CVE-2021-21109: Use after free in payments. Reported by Rong Jian and
       Guang Gong of 360 Alpha Lab
     - CVE-2021-21110: Use after free in safe browsing. Reported by Anonymous
     - CVE-2021-21111: Insufficient policy enforcement in WebUI. Reported by
       Alesandro Ortiz
     - CVE-2021-21112: Use after free in Blink. Reported by YoungJoo Lee
       @ashuu_lee of Raon Whitehat
     - CVE-2021-21113: Heap buffer overflow in Skia. Reported by tsubmunu
     - CVE-2020-16043: Insufficient data validation in networking. Reported by
       Samy Kamkar, Ben Seri at Armis, Gregory Vishnepolsky at Armis
     - CVE-2021-21114: Use after free in audio. Reported by Man Yue Mo of GitHub
       Security Lab
     - CVE-2020-15995: Out of bounds write in V8. Reported by Bohan Liu
       @P4nda20371774 of Tencent Security Xuanwu Lab
     - CVE-2021-21115: Use after free in safe browsing. Reported by Leecraso and
       Guang Gong of 360 Alpha Lab
     - CVE-2021-21116: Heap buffer overflow in audio. Reported by Alison
       Huffman, Microsoft Browser Vulnerability Research
 .
   [ Jan Luca Naumann ]
   * Use desktop gl implementation as default. (closes: 979135)
Checksums-Sha1:
 9d83a1d5ad83468c5ba5da045d0235465fe5321b 3576 chromium_87.0.4280.141-0.1.dsc
 ef2fa29cf9558fc0afbd7791ea6ee8ef73ac37af 393840792 
chromium_87.0.4280.141.orig.tar.xz
 aa7529eee2b61d683a4b7640724485be4c7a0778 189436 
chromium_87.0.4280.141-0.1.debian.tar.xz
Checksums-Sha256:
 0e2c2a41c2186a47eb918e3e046ba084ebf96779b282626798f89ebf8d6ee24a 3576 
chromium_87.0.4280.141-0.1.dsc
 577a92da6e3caacd22b0b2aedc9dc7e895652f54ec3e0f615457357be099b2ae 393840792 
chromium_87.0.4280.141.orig.tar.xz
 20c26ad853b88addb65fbb3a26ba92a89f9d47b33297ad6aefdc2c2470550580 189436 
chromium_87.0.4280.141-0.1.debian.tar.xz
Files:
 fac52e6fd36d86d23ce4d5e4e1ce4e5a 3576 web optional 
chromium_87.0.4280.141-0.1.dsc
 c7f87e38af9193a5889c48e7922ac5a0 393840792 web optional 
chromium_87.0.4280.141.orig.tar.xz
 74969e52ef31b8b93d11dcad704423bd 189436 web optional 
chromium_87.0.4280.141-0.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Wtvn
-----END PGP SIGNATURE-----



----- End forwarded message -----

Attachment: signature.asc
Description: PGP signature


--- End Message ---

Reply via email to