Hi,

Thank you for the quick reply and analisys of the problem.


On Fri, Aug 29, 2025 at 04:50:39PM -0500, Andrew Deason wrote:
> > > On 29.08.25 18:28, Jose M Calhariz wrote:
> > > > Just found out, the latest security update for Debian v11, breaks 
> > > > command bos.
> > > > 
> > > > Any attempt to run "bos status <server>" returns:
> > > > 
> > > > bos: running unauthenticated
> > > > bos: failed to contact host's bosserver (RPC interface mismatch (-451)).
> 
> I can reproduce this; it happens with 1.8.6-5+deb11u1 specifically, not
> 1.8.9-1+deb12u1. I don't think there's anything special about the target
> server; it shouldn't require any particular version.
> 
> It looks like 1.8.6-5+deb11u1 doesn't have upstream commit
> 5abea9b8b1164f203fe18b5abe7d64ac8cb514eb (bos: Let xdr allocate rpc
> output strings), included in upstream 1.8.8. Without that, bos tries to
> reuse the string buffer for various rpc output arguments, which is
> prohibited by the "xdr: Prevent XDR_DECODE buffer overruns" commit,
> mentioned by Ben:
> 
> On Fri, 29 Aug 2025 11:08:38 -0700
> "Benjamin Kaduk" <[email protected]> wrote:
> 
> > I would be looking more closely at the xdr_string() change in src/rx/xdr.c
> > (note the commit message there specifically refers to several callsites in
> > bos.c that rely on the behavior of functions that make use of
> > xdr_string()).
> > 
> > The "OPENAFS-SA-2024-003: xdr: Prevent XDR_DECODE buffer overruns" change
> > is also touching some potentially relevant code, as does
> > "OPENAFS-SA-2024-003: xdr: Ensure correct string length in xdr_string".
> 
> 

-- 
--

Mulheres e elefantes nunca esquecem.

--Dorothy Parker

Attachment: signature.asc
Description: PGP signature

Reply via email to