Your message dated Fri, 20 May 2022 21:21:04 +0000
with message-id <e1nsa3u-0008nt...@fasolo.debian.org>
and subject line Bug#1011127: fixed in openssl 3.0.3-5
has caused the Debian Bug report #1011127,
regarding libssl3 breaks systems vith VIA Nehemiah cpu
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011127: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011127
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libssl3
Version: 3.0.3-4
Severity: grave

Systems with VIA Nehemiah cpu break after upgrading unstable. All commands using libssl3 fail with

traps: modprobe[2002] trap invalid opcode ip:b7c14700 sp:bfed3238 error:0 in libcrypto.so.3[b7ac0000+24f000] traps: sshd[1969] trap invalid opcode ip:b7b9c700 sp:bfedeaf8 error:0 in libcrypto.so.3[b7a48000+24f000]

lscpu shows:

Architecture:                    i686
CPU op-mode(s):                  32-bit
Address sizes:                   32 bits physical, 32 bits virtual
Byte Order:                      Little Endian
CPU(s):                          1
On-line CPU(s) list:             0
Vendor ID:                       CentaurHauls
BIOS Vendor ID:                  VIA
Model name:                      VIA Nehemiah
BIOS Model name: Eden ESP CPU @ 1.0GHz
BIOS CPU family:                 13
CPU family:                      6
Model:                           9
Thread(s) per core:              1
Core(s) per socket:              1
Socket(s):                       1
Stepping:                        8
BogoMIPS:                        1995.89
Flags: fpu vme de pse tsc msr cx8 sep mtrr pge cmov pat mmx fxsr sse cpuid rng rng_en ace ace_en
Vulnerability Itlb multihit:     Processor vulnerable
Vulnerability L1tf:              Vulnerable
Vulnerability Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
Vulnerability Meltdown:          Vulnerable
Vulnerability Spec store bypass: Vulnerable
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Vulnerability Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling
Vulnerability Srbds:             Not affected
Vulnerability Tsx async abort:   Not affected


Systems with a VIA Eden Processor do not show this problem (flags are fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge cmov pat clflush acpi mmx fxsr sse sse2 tm nx cpuid pni est tm2 xtpr rng rng_en ace ace_en ace2 ace2_en phe phe_en pmm pmm_en).



Regards,
--
Wolfgang Walter
Studentenwerk München
Anstalt des öffentlichen Rechts

--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 3.0.3-5
Done: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior <sebast...@breakpoint.cc> (supplier of updated 
openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 20 May 2022 22:01:29 +0200
Source: openssl
Architecture: source
Version: 3.0.3-5
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@alioth-lists.debian.net>
Changed-By: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
Closes: 1011127
Changes:
 openssl (3.0.3-5) unstable; urgency=medium
 .
   * Don't generate endbr32 opcodes on i386. Thanks to Wolfgang Walter
     (Closes: #1011127).
   * Backport more compare fixes from upstream.
Checksums-Sha1:
 f8c79de1ff724fd17638ecafa5f097cdec383c40 2601 openssl_3.0.3-5.dsc
 d84f42959d82839b4d9738423f9adc3eda60c6ea 79872 openssl_3.0.3-5.debian.tar.xz
Checksums-Sha256:
 6dbf91da654e18bb1e232ef56ea2032f6a1d121eaa288e67204f4ddc9f8a3e1d 2601 
openssl_3.0.3-5.dsc
 ac34918adfb00a1067c0d38d8c2fa3561d6b6a013b4da05497fc730da6138660 79872 
openssl_3.0.3-5.debian.tar.xz
Files:
 5f3dc2d2782a1def9715e5279fa2efac 2601 utils optional openssl_3.0.3-5.dsc
 3e040397fdf199debfc2ba1edf97fee4 79872 utils optional 
openssl_3.0.3-5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=l8uM
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to