On Fri, Aug 29, 2025 at 07:47:10PM +0200, Thorsten Alteholz wrote:
> Hi Jose,
> 
> On 29.08.25 18:28, Jose M Calhariz wrote:
> > Just found out, the latest security update for Debian v11, breaks command 
> > bos.
> > 
> > Any attempt to run "bos status <server>" returns:
> > 
> > bos: running unauthenticated
> > bos: failed to contact host's bosserver (RPC interface mismatch (-451)).
> 
> can you please tell me more about your cell? What version is your bosserver
> running? Are there clients/server in the cell, that are still vulnerable to
> CVE-2024-10397?
> I assume that this newly added check:
> tconfig.cacheConfig_len != sizeof(cm_initparams_v1)/sizeof(afs_uint32)
> 
> in src/libadmin/adminutil/afs_utilAdmin:util_CMClientConfig() is failing.
> Probably your server and client disagree on the size of some structs.

I do not think that specific check would be relevant here -- the libadmin
code is mostly unused in terms of the actual binaries that we ship.

I would be looking more closely at the xdr_string() change in src/rx/xdr.c
(note the commit message there specifically refers to several callsites in
bos.c that rely on the behavior of functions that make use of
xdr_string()).

The "OPENAFS-SA-2024-003: xdr: Prevent XDR_DECODE buffer overruns" change
is also touching some potentially relevant code, as does
"OPENAFS-SA-2024-003: xdr: Ensure correct string length in xdr_string".

So more information about the cell would be helpful in trying to track down
what is happening.

-Ben

Reply via email to