• Bug#1095808: Baseline violation on amd64, SIGILL on non-SSE4.1 systems

    From Jakob Haufe@21:1/5 to All on Wed Feb 12 11:00:01 2025
    Package: libfreerdp3-3
    Version: 3.11.1+dfsg-1
    Severity: serious
    Tags: upstream patch

    libfreerdp 3.11 introduced SSE4.1 optimizations but the runtime check
    is implemented incorrectly, leading to SIGILL on machines without SSE4.1.

    A fix is scheduled for 3.12 in [1]. I did a local rebuild with those 3
    commits applied via d/patches and it solves the issue.

    Note that the runtime check was wrong on all platforms, but maybe
    others were lucky enough to not have those optimized instructions being
    emitted *before* the check. So while this issue showed on amd64, arm
    could be affected as well.

    [1] https://github.com/FreeRDP/FreeRDP/pull/11163

    Cheers,
    sur5r

    -- System Information:
    Debian Release: trixie/sid
    APT prefers testing
    APT policy: (501, 'testing'), (500, 'stable-updates'), (500, 'stable-security'), (500, 'proposed-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental')
    Architecture: amd64 (x86_64)
    Foreign Architectures: i386

    Kernel: Linux 6.12.11-amd64 (SMP w/4 CPU threads; PREEMPT)
    Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
    Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    Versions of packages libfreerdp3-3 depends on:
    ii libavcodec61 7:7.1-3+b2
    ii libavutil59 7:7.1-3+b2
    ii libc6 2.40-6
    ii libssl3t64 3.4.0-2
    ii libswresample5 7:7.1-3+b2
    ii libswscale8 7:7.1-3+b2
    ii libwinpr3-3 3.11.1+dfsg-1
    ii libx11-6 2:1.8.10-2
    ii libxkbfile1 1:1.1.0-1+b4
    ii zlib1g 1:1.3.dfsg+really1.3.1-1+b1

    libfreerdp3-3 recommends no packages.

    Versions of packages libfreerdp3-3 suggests:
    ii freerdp3-x11 3.11.1+dfsg-1

    -- no debconf information



    --
    ceterum censeo microsoftem esse delendam.

    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEe/X2rDZDH11A3BN6TPKyGPVNrj0FAmesbaUACgkQTPKyGPVN rj1xZw/9Hx/QIV3kkv5qXkQWitWodImnaGz2jn67Ayb0FvSIoEzchetF3XkJAJ5R nb8A/kBgDnU+Ro+dVT7FzSI4Y5ex0tbtlebUYFr+wogNY3q4A/XKi0sPCCxlyFYP 0Zc4Z5REM/CZJX7CcM8SSyxaqPzXqM8+wQK9HKGpRd1mrIGPF5wyxeI3gIR7B26r bOYJRwlPLavlTlIdRBAZevefsCGUpTeCTLm+hmsMdNr7CUjqbuWYjbCXuMH+MrL6 h151NAS+ZGWGYnsf4QDEqmMrUfFuU/l2L4ejfFje/f4iZiZU203KDxqgPXi9NZnA 3a0cxZ562emboDjMa1Nmk4ppu2XjjDnWwnkAW2zZoqeHPxqghDPBSAYgpAzRSIB1 WFCgTneS6CAop1GUnksWxwvq86HRHZN3GKrDlLU9V2DuhJZc9IoXhp4mYi3PtJcq 7gSvqaFqMPbhB1WyckdFBOXSOpQ5AVMZccxK5M5CZVg6wM+2fEOTNVO1vIXvzMc8 F9dZpo9PMHxnhrX1aa5/VvwU9H9AzZuV0LVt0dlgkIoBle0qMSyzvlEHkIHe/f0y Y5JDAZ4qsOymi+2AdMOEXv0U5brrhT0Hwsh1A9QhKosATcMRSzc/k68d8lppjOwC G9mgbfjCtilxq9e6lAXV500foI6+MavuYM1eeQRuHw/T0axeS3A=
    =lbFu
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Sun Feb 16 00:30:05 2025
    This is a multi-part message in MIME format...

    Your message dated Sun, 16 Feb 2025 00:11:33 +0100
    with message-id <Z7EfJaUgu-IgGrzH@mail.manty.net>
    and subject line This has been fixed on 3.12.0
    has caused the Debian Bug report #1095808,
    regarding Baseline violation on amd64, SIGILL on non-SSE4.1 systems
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1095808: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095808
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 12 Feb 2025 09:55:08 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-21.8 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,FOURLA,FROMDEVELOPER,HAS_PACKAGE,
    HEADER_FROM_DIFFERENT_DOMAINS,PGPSIGNATURE,RCVD_IN_DNSWL_MED,
    SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 16; hammy, 150; neutral, 177; spammy,
    0. spammytokens: hammytokens:0.000-+--H*UA:sk:x86_64-, 0.000-+--trixie,
    0.000-+--H*x:sk:x86_64-, 0.000-+--sk:taint_o, 0.000-+--sk:TAINT_O Return-path: <SRS0=yyDm=VD=debian.org=sur5r@norsu.hel.sur5r.net>
    Received: from norsu.hel.sur5r.net ([2a01:4f9:2b:18e5::1]:49728)
    by buxtehude.debian.org with esmtps (TLS1.