Your message dated Fri, 24 Nov 2023 18:34:19 +0000
with message-id <[email protected]>
and subject line Bug#1056399: fixed in libcryptx-perl 0.080-2
has caused the Debian Bug report #1056399,
regarding libcryptx-perl: invalid opcode in CryptX.so
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1056399: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056399
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libcryptx-perl
Version: 0.080-1
Severity: important
X-Debbugs-Cc: [email protected]
Dear maintainer,
spamd fail due to an invalid opcode in CryptX.so on an AMD Athlon(tm) II X2
255 machine:
2023-11-21T13:16:47.795562+00:00 tanja kernel: [1127566.199310] traps: spamd
child[12938] trap invalid opcode ip:7fd302f0e3a4 sp:7fffbb5af1f8 error:0 in
CryptX.so[7fd302ebb000+9b000]
Regards
Benedikt Spranger
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.5.0-4-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled
# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 48 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 2
On-line CPU(s) list: 0,1
Vendor ID: AuthenticAMD
BIOS Vendor ID: AMD
Model name: AMD Athlon(tm) II X2 255 Processor
BIOS Model name: AMD Athlon(tm) II X2 255 Processor CPU @ 3.1GHz
BIOS CPU family: 29
CPU family: 16
Model: 6
Thread(s) per core: 1
Core(s) per socket: 2
Socket(s): 1
Stepping: 2
CPU(s) scaling MHz: 26%
CPU max MHz: 3100,0000
CPU min MHz: 800,0000
BogoMIPS: 6227,51
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mc
a cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall n
x mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow cons
tant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pn
i monitor cx16 popcnt lahf_lm cmp_legacy svm extapic cr
8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs s
kinit wdt hw_pstate vmmcall npt lbrv svm_lock nrip_save
Virtualization features:
Virtualization: AMD-V
Caches (sum of all):
L1d: 128 KiB (2 instances)
L1i: 128 KiB (2 instances)
L2: 2 MiB (2 instances)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0,1
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: Not affected
L1tf: Not affected
Mds: Not affected
Meltdown: Not affected
Mmio stale data: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Not affected
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer
sanitization
Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PB
RSB-eIBRS Not affected
Srbds: Not affected
Tsx async abort: Not affected
Versions of packages libcryptx-perl depends on:
ii libc6 2.37-12
ii perl [libmath-bigint-perl] 5.36.0-9
ii perl-base [perlapi-5.36.0] 5.36.0-9
Versions of packages libcryptx-perl recommends:
ii libjson-perl 4.10000-1
libcryptx-perl suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: libcryptx-perl
Source-Version: 0.080-2
Done: gregor herrmann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
libcryptx-perl, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
gregor herrmann <[email protected]> (supplier of updated libcryptx-perl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 24 Nov 2023 19:14:56 +0100
Source: libcryptx-perl
Architecture: source
Version: 0.080-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <[email protected]>
Changed-By: gregor herrmann <[email protected]>
Closes: 1056399
Changes:
libcryptx-perl (0.080-2) unstable; urgency=medium
.
* Team upload.
.
[ Benedikt Spranger ]
* Step back to Debian architectural baseline.
The Debian architectural baseline states: amd64 x86_64 with no optional
extensions (psABI baseline). The core specification includes MMX, SSE and
SSE2 so these are OK, but SSE3 and up are not guaranteed.
Remove the SSE4.1 and AES compiler flags.
Closes: #1056399
Checksums-Sha1:
2e80670fbb8ff4bdb9e73f557a3dea645b2cd169 2377 libcryptx-perl_0.080-2.dsc
9f30cd4b2fdbc93f0e677f9f865b62279a717ebe 6020
libcryptx-perl_0.080-2.debian.tar.xz
Checksums-Sha256:
ae9678ad0e1605868aff09e4ccb6d4c2ca9c698d777108c4598447c2cde20280 2377
libcryptx-perl_0.080-2.dsc
ff055857e88ef0de9828f07e7406856bf6f17a6a0f0de448e9aed32d109a07ee 6020
libcryptx-perl_0.080-2.debian.tar.xz
Files:
12a6433e1153b618271d40210fea4e0e 2377 perl optional libcryptx-perl_0.080-2.dsc
143db1a7edd7faa9ed5d1e6df2076528 6020 perl optional
libcryptx-perl_0.080-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=qRAQ
-----END PGP SIGNATURE-----
--- End Message ---