[Bug 519] parsing bug in host.allow element of login.conf(5)

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Tue Mar 25 11:36:36 EST 2003


           Summary: parsing bug in host.allow element of login.conf(5)
           Product: Portable OpenSSH
           Version: 3.5p1
          Platform: All
               URL: http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ssh/
        OS/Version: NetBSD
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: openssh-unix-dev at mindrot.org
        ReportedBy: lukem at netbsd.org

There's a bug in the parser code for the "host.allow" element of login.conf(5).
If you have more than one hostname in a comma separated argument to
"host.allow=", and there's not a positive or negative match on the first
element, sshd will infinitely loop because there's a missing strtok() to advance
to the next field.
The URL quoted above contains the cvs commit message I made to NetBSD-current to
fix the problem there.

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

More information about the openssh-unix-dev mailing list