diff options
author | Michael Mair-Keimberger (asterix) <m.mairkeimberger@gmail.com> | 2017-02-10 16:57:33 +0100 |
---|---|---|
committer | David Seifert <soap@gentoo.org> | 2017-02-10 23:33:30 +0100 |
commit | 3ab47a6c79a83ed307d718c08b5453382ab85829 (patch) | |
tree | 17097501cce09a09a626dd9b269f38c985214fe9 /sys-cluster/torque | |
parent | f9289de293c88909af80c69f2ff6f602bc0b127f (diff) | |
download | gentoo-3ab47a6c79a83ed307d718c08b5453382ab85829.tar.gz gentoo-3ab47a6c79a83ed307d718c08b5453382ab85829.tar.xz |
sys-cluster/torque: remove unused patch
Closes: https://github.com/gentoo/gentoo/pull/3900
Diffstat (limited to 'sys-cluster/torque')
-rw-r--r-- | sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch | 38 |
1 files changed, 0 insertions, 38 deletions
diff --git a/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch b/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch deleted file mode 100644 index 3614e42721d..00000000000 --- a/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch +++ /dev/null @@ -1,38 +0,0 @@ -From 6424696d7b160c8a9ad806c4a6b0f77f0d359962 Mon Sep 17 00:00:00 2001 -From: Justin Bronder <jsbronder@gmail.com> -Date: Mon, 23 Dec 2013 12:48:22 -0500 -Subject: [PATCH] CVE-2013-4319: 4.x root submit fix - -https://bugs.gentoo.org/show_bug.cgi?id=484320 -http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319 ---- - src/resmom/mom_process_request.c | 13 +++++++++++++ - 1 file changed, 13 insertions(+) - -diff --git a/src/resmom/mom_process_request.c b/src/resmom/mom_process_request.c -index 049f63f..813833f 100644 ---- a/src/resmom/mom_process_request.c -+++ b/src/resmom/mom_process_request.c -@@ -238,6 +238,19 @@ void *mom_process_request( - log_record(PBSEVENT_JOB, PBS_EVENTCLASS_JOB, __func__, log_buffer); - } - -+ if (svr_conn[chan->sock].cn_authen != PBS_NET_CONN_FROM_PRIVIL) -+ { -+ sprintf(log_buffer, "request type %s from host %s rejected (connection not privileged)", -+ reqtype_to_txt(request->rq_type), -+ request->rq_host); -+ -+ log_record(PBSEVENT_JOB, PBS_EVENTCLASS_JOB, __func__, log_buffer); -+ req_reject(PBSE_BADHOST, 0, request, NULL, "request not authorized"); -+ mom_close_client(chan->sock); -+ DIS_tcp_cleanup(chan); -+ return NULL; -+ } -+ - if (!AVL_is_in_tree_no_port_compare(svr_conn[chan->sock].cn_addr, 0, okclients)) - { - sprintf(log_buffer, "request type %s from host %s rejected (host not authorized)", --- -1.8.3.2 - |