--- a/open-src/xserver/xorg/CVE-2011-4028.patch Wed Sep 25 10:37:28 2013 -0700
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-From 6ba44b91e37622ef8c146d8f2ac92d708a18ed34 Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <[email protected]>
-Date: Mon, 17 Oct 2011 22:26:12 +0200
-Subject: [PATCH 1/2] Fix CVE-2011-4028: File disclosure vulnerability.
-
-use O_NOFOLLOW to open the existing lock file, so symbolic links
-aren't followed, thus avoid revealing if it point to an existing
-file.
-
-Signed-off-by: Matthieu Herrb <[email protected]>
-Reviewed-by: Alan Coopersmith <[email protected]>
----
- os/utils.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/os/utils.c b/os/utils.c
-index e8ecb71..fe49254 100644
---- a/os/utils.c
-+++ b/os/utils.c
-@@ -318,7 +318,7 @@ LockServer(void)
- /*
- * Read the pid from the existing file
- */
-- lfd = open(LockFile, O_RDONLY);
-+ lfd = open(LockFile, O_RDONLY|O_NOFOLLOW);
- if (lfd < 0) {
- unlink(tmp);
- FatalError("Can't read lock file %s\n", LockFile);
---
-1.7.3.2
-