Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: [email protected]
Control: affects -1 + src:sudo
User: [email protected]
Usertags: pu

(Please provide enough information to help the release team
to judge the request efficiently. E.g. by filling in the
sections below.)

[ Reason ]
sudo on i386 on a not-quite-i686 CPU like the AMD Geode terminates with 
an illegal opcode error.

[ Impact ]
Sudo is unuseable on those machines.

[ Tests ]
This has been discussed with the TC (#1113774). sudo has a testsuite.

[ Risks ]
bookworm is the last full release for i386. It is therefore likely to be 
used for a long time.

[ Checklist ]
  [X] *all* changes are documented in the d/changelog
  [X] I reviewed all changes and I approve them
  [X] attach debdiff against the package in (old)stable
  [X] the issue is verified as fixed in unstable

[ Changes ]
Enable intel CET on amd64 only
diff -Nru sudo-1.9.13p3/debian/changelog sudo-1.9.13p3/debian/changelog
--- sudo-1.9.13p3/debian/changelog      2025-06-24 09:29:50.000000000 +0200
+++ sudo-1.9.13p3/debian/changelog      2025-12-30 21:07:33.000000000 +0100
@@ -1,3 +1,12 @@
+sudo (1.9.13p3-1+deb12u3) bookworm; urgency=medium
+
+  * Apply a patch fro Marcos Del Sol Vives to Enable Intel CET on amd64 only.
+    This has been discussed with the TC in #1113774. After following their
+    advice to apply the patch, I verified that this change produces an
+    identical deb on amd64 (Closes: #1124339)
+
+ -- Marc Haber <[email protected]>  Tue, 30 Dec 2025 21:07:33 
+0100
+
 sudo (1.9.13p3-1+deb12u2) bookworm-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru sudo-1.9.13p3/debian/patches/amd64-ibt.diff 
sudo-1.9.13p3/debian/patches/amd64-ibt.diff
--- sudo-1.9.13p3/debian/patches/amd64-ibt.diff 1970-01-01 01:00:00.000000000 
+0100
+++ sudo-1.9.13p3/debian/patches/amd64-ibt.diff 2025-12-30 21:07:33.000000000 
+0100
@@ -0,0 +1,28 @@
+From: Marcos Del Sol Vives <[email protected]>
+Date: Tue, 2 Sep 2025 00:00:35 +0200
+Subject: Enable Intel CET on amd64 only
+
+---
+ m4/hardening.m4 | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/m4/hardening.m4 b/m4/hardening.m4
+index f7d2a8c..cc7ee01 100644
+--- a/m4/hardening.m4
++++ b/m4/hardening.m4
+@@ -105,6 +105,7 @@ AC_DEFUN([SUDO_CHECK_HARDENING], [
+               ])
+           fi
+ 
++          if test "$host_cpu" = "x86_64"; then
+           # Check for control-flow transfer instrumentation (Intel CET).
+           AX_CHECK_COMPILE_FLAG([-fcf-protection], [
+               AX_CHECK_LINK_FLAG([-fcf-protection], [
+@@ -112,6 +113,7 @@ AC_DEFUN([SUDO_CHECK_HARDENING], [
+                   AX_APPEND_FLAG([-Wc,-fcf-protection], [HARDENING_LDFLAGS])
+               ])
+           ])
++          fi
+       fi
+ 
+       # Linker-specific hardening flags.
diff -Nru sudo-1.9.13p3/debian/patches/series 
sudo-1.9.13p3/debian/patches/series
--- sudo-1.9.13p3/debian/patches/series 2025-06-24 09:24:11.000000000 +0200
+++ sudo-1.9.13p3/debian/patches/series 2025-12-30 21:07:33.000000000 +0100
@@ -1,8 +1,6 @@
-# 1004909-ftbfs-kfreebsd
-# debian-bugs-1019428
-# dont-create-ChangeLog
 debian-bug-1039557
 paths-in-samples.diff
 Whitelist-DPKG_COLORS-environment-variable.diff
 sudo-ldap-docs
 sudo_host_vuln.diff
+amd64-ibt.diff

Reply via email to