From owner-freebsd-security@freebsd.org Wed Sep 30 19:41:42 2015 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8C746A0B9A6 for ; Wed, 30 Sep 2015 19:41:42 +0000 (UTC) (envelope-from prvs=071588ecfe=rblayzor.bulk@inoc.net) Received: from mta0.alb.inoc.net (mta0.alb.inoc.net [IPv6:2607:f058:110:2::1:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 52638156B for ; Wed, 30 Sep 2015 19:41:42 +0000 (UTC) (envelope-from prvs=071588ecfe=rblayzor.bulk@inoc.net) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=inoc.net; s=201501; h=To:References:Message-Id:Content-Transfer-Encoding:Cc:Date: In-Reply-To:From:Subject:Mime-Version:Content-Type; bh=5BzVoQFoSyZ0P1xLApyOf00avsrm1qgNPOuGd7cF80I=; b=hhSI0VLjvTvisbXbZ2ciUsVSsB 5ictaBP1ccmR6vi8RK/feinQ4/IY+BrTtXhU0nGikwU3p88mtQMcgdX0Qd9Yztd8L1b/x3fKSOeLy Wfs0Lp+R3c6nTEvgVtqTWwU1crnJ6aiHkJmPcZyLNLj3F6dZZLaKqt/z9hXz0w3X9dNXNRXFrnVgu Fihr4TIQ83MMYiSmyj++NSDAE/uDCqsfL9ymsdGqlflXnyOE7uCoYKhlc+5ljhOe2QyImvxpGtFCb 2TFytqWSEpddCRyQ6KBKX5UWVk/F6X267YHa2QRFYG6+CGs24h7Uu8WFxjGUp80M8AsSiKuPsUfsS REArRpeQ==; Received: from [64.246.135.7] (helo=void.ops.inoc.net) by mail.inoc.net with ESMTPA (Exim 4.86) (envelope-from ) id 1ZhNG1-000J93-69 by authid ; Wed, 30 Sep 2015 19:41:41 +0000 Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\)) Subject: Re: FreeBSD Security Advisory FreeBSD-SA-15:24.rpcbind From: Robert Blayzor In-Reply-To: <560C39B3.1020806@delphij.net> Date: Wed, 30 Sep 2015 15:41:40 -0400 Cc: freebsd-security@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20150929183942.569F311FD@freefall.freebsd.org> <560C33B7.70100@delphij.net> <560C39B3.1020806@delphij.net> To: d@delphij.net X-Mailer: Apple Mail (2.2104) X-Auth-Info: cmJsYXl6b3JAaW5vYy5uZXQ= X-Virus-Scanned: ClamAV 0.98.7/20949/Wed Sep 30 14:30:18 2015 X-Anti-Abuse: Please report to abuse@inoc.net X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2015 19:41:42 -0000 > I have created an empty testing domain but can't reproduce the problem > -- however, the backtrace does seem related to the change (which may > indicate a real problem with the old code, though). Please let me = know > if you have additional information. >=20 here is the crash with rpcbind in the foreground: [~] sudo rpcbind -d Password: rpcbind debugging enabled. Assertion failed: (dst->buf =3D=3D NULL), function netbuf_copybuf, file = /usr/10.2-RELEASE/usr.sbin/rpcbind/rpcb_svc_com.c, line 1056. Not exactly sure which rpc is kicking it, but we have lockd, statd, = ypserv =85 nfs client is enabled, but not currently used.. If you need more than this it will take some time for debugging symbols. -- Robert inoc.net!rblayzor Jabber: rblayzor.AT.inoc.net PGP Key: 78BEDCE1 @ pgp.mit.edu