summaryrefslogtreecommitdiff
path: root/sys-cluster/torque
diff options
context:
space:
mode:
authorMichael Mair-Keimberger (asterix) <m.mairkeimberger@gmail.com>2017-02-10 16:57:33 +0100
committerDavid Seifert <soap@gentoo.org>2017-02-10 23:33:30 +0100
commit3ab47a6c79a83ed307d718c08b5453382ab85829 (patch)
tree17097501cce09a09a626dd9b269f38c985214fe9 /sys-cluster/torque
parentf9289de293c88909af80c69f2ff6f602bc0b127f (diff)
downloadgentoo-3ab47a6c79a83ed307d718c08b5453382ab85829.tar.gz
gentoo-3ab47a6c79a83ed307d718c08b5453382ab85829.tar.xz
sys-cluster/torque: remove unused patch
Closes: https://github.com/gentoo/gentoo/pull/3900
Diffstat (limited to 'sys-cluster/torque')
-rw-r--r--sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch38
1 files changed, 0 insertions, 38 deletions
diff --git a/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch b/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch
deleted file mode 100644
index 3614e42721d..00000000000
--- a/sys-cluster/torque/files/CVE-2013-4319-4.x-root-submit-fix.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From 6424696d7b160c8a9ad806c4a6b0f77f0d359962 Mon Sep 17 00:00:00 2001
-From: Justin Bronder <jsbronder@gmail.com>
-Date: Mon, 23 Dec 2013 12:48:22 -0500
-Subject: [PATCH] CVE-2013-4319: 4.x root submit fix
-
-https://bugs.gentoo.org/show_bug.cgi?id=484320
-http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319
----
- src/resmom/mom_process_request.c | 13 +++++++++++++
- 1 file changed, 13 insertions(+)
-
-diff --git a/src/resmom/mom_process_request.c b/src/resmom/mom_process_request.c
-index 049f63f..813833f 100644
---- a/src/resmom/mom_process_request.c
-+++ b/src/resmom/mom_process_request.c
-@@ -238,6 +238,19 @@ void *mom_process_request(
- log_record(PBSEVENT_JOB, PBS_EVENTCLASS_JOB, __func__, log_buffer);
- }
-
-+ if (svr_conn[chan->sock].cn_authen != PBS_NET_CONN_FROM_PRIVIL)
-+ {
-+ sprintf(log_buffer, "request type %s from host %s rejected (connection not privileged)",
-+ reqtype_to_txt(request->rq_type),
-+ request->rq_host);
-+
-+ log_record(PBSEVENT_JOB, PBS_EVENTCLASS_JOB, __func__, log_buffer);
-+ req_reject(PBSE_BADHOST, 0, request, NULL, "request not authorized");
-+ mom_close_client(chan->sock);
-+ DIS_tcp_cleanup(chan);
-+ return NULL;
-+ }
-+
- if (!AVL_is_in_tree_no_port_compare(svr_conn[chan->sock].cn_addr, 0, okclients))
- {
- sprintf(log_buffer, "request type %s from host %s rejected (host not authorized)",
---
-1.8.3.2
-