Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Description of problem:
line with more then 2048 character is ignored
Version-Release number of selected component (if applicable):
tcp_wrappers-7.6-58.el6
How reproducible:
always
Steps to Reproduce:
0.
client: 192.168.122.159
server: 192.168.122.212
1, [hosts.allow_1] , more then 2048 characters
from client: ssh root.122.212
ssh_exchange_identification: Connection closed by remote host
2, delete few records to have <2048 char from hosts.allow which is [hosts.allow_2]
from client: ssh root.122.212
It works as expected here. It asks for password.
Actual results:
line is ignored
Expected results:
line is not ignored
or
if necessary log it visible that line is ignored
Additional info:
For the reference:
Debian bug [1]:
> I do not know, but I do not look forward to modify mature security sensitive code which I do not know well.
> Marco
CentOS bug [2]:
untouched
Fixing it might take two ways:
* moving hard limit which just moves the issue further
* significantly rewrite xgets and/or the callee function to accommodate elastic buffer. Might introduce other bugs. As soon as I will have some prototype, I will update the bug.
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=648181
[2] https://bugs.centos.org/view.php?id=10017
Created attachment 1130854[details]
proposed patch
I put together patch providing flexible buffer if we overrun the static one. For the most of the cases, the static one should be used. If we encounter longer line, we allocate longer buffer.
Basic testing worked for me. Please consider if we really want this in RHEL6 and request ACKs.
Here is scratch build for x86_64:
http://brewweb.devel.redhat.com/brew/taskinfo?taskID=10566822
Comment 7RHEL Program Management
2016-02-26 20:35:56 UTC
Development Management has reviewed and declined this request.
You may appeal this decision by reopening this request.
Comment 17Nikos Mavrogiannopoulos
2016-05-24 12:34:04 UTC
This is a limitation of the software but hardly a security issue.