Bug 519 - parsing bug in host.allow element of login.conf(5)
Summary: parsing bug in host.allow element of login.conf(5)
Status: CLOSED INVALID
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: sshd (show other bugs)
Version: -current
Hardware: All NetBSD
: P2 normal
Assignee: OpenSSH Bugzilla mailing list
URL: http://cvsweb.netbsd.org/bsdweb.cgi/s...
Keywords:
Depends on:
Blocks:
 
Reported: 2003-03-25 11:36 AEDT by Luke Mewburn
Modified: 2004-04-14 12:24 AEST (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Luke Mewburn 2003-03-25 11:36:35 AEDT
There's a bug in the parser code for the "host.allow" element of login.conf(5).
If you have more than one hostname in a comma separated argument to
"host.allow=", and there's not a positive or negative match on the first
element, sshd will infinitely loop because there's a missing strtok() to advance
to the next field.
The URL quoted above contains the cvs commit message I made to NetBSD-current to
fix the problem there.
Comment 1 Damien Miller 2003-06-04 23:05:04 AEST
This is a NetBSD specific bug - neither OpenBSD nor portable OpenSSH have
host.deny in login.conf.
Comment 2 Damien Miller 2004-04-14 12:24:18 AEST
Mass change of RESOLVED bugs to CLOSED