Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 27 Apr 2019 18:38:28 +0200
Subject: Re: Multiple BIND vulnerabilities disclosed
 (CVE-2018-5743, CVE-2019-6467, and CVE-2019-6468)

On 12:13 25.04.19, Peter Korsgaard wrote:
> It is a bit unfortunate that these security fixes now use
> isc_atomic_xadd() which are not available on all architectures:
> .libs/client.o: In function `mark_tcp_active':
> client.c:(.text+0xc7c): undefined reference to `isc_atomic_xadd'
> client.c:(.text+0xca0): undefined reference to `isc_atomic_xadd'
> .libs/client.o: In function `client_accept':
> client.c:(.text+0x2210): undefined reference to `isc_atomic_xadd'
> client.c:(.text+0x230c): undefined reference to `isc_atomic_xadd'
> .libs/client.o: In function `exit_check':
> client.c:(.text+0x2958): undefined reference to `isc_atomic_xadd'
> .libs/client.o:client.c:(.text+0x5cb4): more undefined references to `isc_atomic_xadd' follow
> collect2: error: ld returned 1 exit status

There is a commit [1] on ISCs GitLab that removes the atomic operations
in favor of refcounting and thus fixes the aarch64 (and other archs?)
build error.

I applied that commit for NixOS. Looks good so far [2].

cheers, andi-


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.