The branch stable/12 has been updated by emaste:

URL: 
https://cgit.FreeBSD.org/src/commit/?id=d07cfacb67b962d80bfe089aab22f5b312a439bd

commit d07cfacb67b962d80bfe089aab22f5b312a439bd
Author:     Ed Maste <ema...@freebsd.org>
AuthorDate: 2023-02-06 16:33:38 +0000
Commit:     Ed Maste <ema...@freebsd.org>
CommitDate: 2023-02-08 21:06:22 +0000

    ssh: fix bug in PermitRemoteOpen which caused it to ignore...
    
    its first argument unless it was one of the special keywords "any" or
    "none".
    
    Obtained from:  OpenSSH-portable commit b3daa8dc5823
    Sponsored by:   The FreeBSD Foundation
    
    (cherry picked from commit 94e21add45344f0669f910ea77db499e8c892c90)
    (cherry picked from commit 375bb3704d1371dec08f49cf8767f7b98162da34)
---
 crypto/openssh/readconf.c | 62 +++++++++++++++++++++++++----------------------
 1 file changed, 33 insertions(+), 29 deletions(-)

diff --git a/crypto/openssh/readconf.c b/crypto/openssh/readconf.c
index 4487b1066fa7..2bb38ff70a19 100644
--- a/crypto/openssh/readconf.c
+++ b/crypto/openssh/readconf.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: readconf.c,v 1.369 2022/09/17 10:33:18 djm Exp $ */
+/* $OpenBSD: readconf.c,v 1.371 2023/01/02 07:03:30 djm Exp $ */
 /*
  * Author: Tatu Ylonen <y...@cs.hut.fi>
  * Copyright (c) 1995 Tatu Ylonen <y...@cs.hut.fi>, Espoo, Finland
@@ -1577,37 +1577,37 @@ parse_pubkey_algos:
        case oPermitRemoteOpen:
                uintptr = &options->num_permitted_remote_opens;
                cppptr = &options->permitted_remote_opens;
-               arg = argv_next(&ac, &av);
-               if (!arg || *arg == '\0')
-                       fatal("%s line %d: missing %s specification",
-                           filename, linenum, lookup_opcode_name(opcode));
                uvalue = *uintptr;      /* modified later */
-               if (strcmp(arg, "any") == 0 || strcmp(arg, "none") == 0) {
-                       if (*activep && uvalue == 0) {
-                               *uintptr = 1;
-                               *cppptr = xcalloc(1, sizeof(**cppptr));
-                               (*cppptr)[0] = xstrdup(arg);
-                       }
-                       break;
-               }
+               i = 0;
                while ((arg = argv_next(&ac, &av)) != NULL) {
                        arg2 = xstrdup(arg);
-                       p = hpdelim(&arg);
-                       if (p == NULL) {
-                               fatal("%s line %d: missing host in %s",
-                                   filename, linenum,
-                                   lookup_opcode_name(opcode));
-                       }
-                       p = cleanhostname(p);
-                       /*
-                        * don't want to use permitopen_port to avoid
-                        * dependency on channels.[ch] here.
-                        */
-                       if (arg == NULL ||
-                           (strcmp(arg, "*") != 0 && a2port(arg) <= 0)) {
-                               fatal("%s line %d: bad port number in %s",
-                                   filename, linenum,
-                                   lookup_opcode_name(opcode));
+                       /* Allow any/none only in first position */
+                       if (strcasecmp(arg, "none") == 0 ||
+                           strcasecmp(arg, "any") == 0) {
+                               if (i > 0 || ac > 0) {
+                                       error("%s line %d: keyword %s \"%s\" "
+                                           "argument must appear alone.",
+                                           filename, linenum, keyword, arg);
+                                       goto out;
+                               }
+                       } else {
+                               p = hpdelim(&arg);
+                               if (p == NULL) {
+                                       fatal("%s line %d: missing host in %s",
+                                           filename, linenum,
+                                           lookup_opcode_name(opcode));
+                               }
+                               p = cleanhostname(p);
+                               /*
+                                * don't want to use permitopen_port to avoid
+                                * dependency on channels.[ch] here.
+                                */
+                               if (arg == NULL || (strcmp(arg, "*") != 0 &&
+                                   a2port(arg) <= 0)) {
+                                       fatal("%s line %d: bad port number "
+                                           "in %s", filename, linenum,
+                                           lookup_opcode_name(opcode));
+                               }
                        }
                        if (*activep && uvalue == 0) {
                                opt_array_append(filename, linenum,
@@ -1615,7 +1615,11 @@ parse_pubkey_algos:
                                    cppptr, uintptr, arg2);
                        }
                        free(arg2);
+                       i++;
                }
+               if (i == 0)
+                       fatal("%s line %d: missing %s specification",
+                           filename, linenum, lookup_opcode_name(opcode));
                break;
 
        case oClearAllForwardings:

Reply via email to