summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch')
-rw-r--r--meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch34
1 files changed, 0 insertions, 34 deletions
diff --git a/meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch b/meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch
deleted file mode 100644
index 852a43f2de..0000000000
--- a/meta/recipes-extended/xinetd/xinetd/xinetd-CVE-2013-4342.patch
+++ /dev/null
@@ -1,34 +0,0 @@
1xinetd: CVE-2013-4342
2
3xinetd does not enforce the user and group configuration directives
4for TCPMUX services, which causes these services to be run as root
5and makes it easier for remote attackers to gain privileges by
6leveraging another vulnerability in a service.
7http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4342
8
9the patch come from:
10https://bugzilla.redhat.com/attachment.cgi?id=799732&action=diff
11
12CVE: CVE-2013-4342
13Signed-off-by: Li Wang <li.wang@windriver.com>
14Upstream-Status: Backport
15---
16 xinetd/builtins.c | 2 +-
17 1 file changed, 1 insertion(+), 1 deletion(-)
18
19diff --git a/xinetd/builtins.c b/xinetd/builtins.c
20index 3b85579..34a5bac 100644
21--- a/xinetd/builtins.c
22+++ b/xinetd/builtins.c
23@@ -617,7 +617,7 @@ static void tcpmux_handler( const struct server *serp )
24 if( SC_IS_INTERNAL( scp ) ) {
25 SC_INTERNAL(scp, nserp);
26 } else {
27- exec_server(nserp);
28+ child_process(nserp);
29 }
30 }
31
32--
331.7.9.5
34