open-src/xserver/xorg/CVE-2011-4028.patch
changeset 1370 7a7a374453e5
parent 1369 687fad3a623f
child 1371 9bb1917dba72
--- a/open-src/xserver/xorg/CVE-2011-4028.patch	Wed Sep 25 10:37:28 2013 -0700
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-From 6ba44b91e37622ef8c146d8f2ac92d708a18ed34 Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <[email protected]>
-Date: Mon, 17 Oct 2011 22:26:12 +0200
-Subject: [PATCH 1/2] Fix CVE-2011-4028: File disclosure vulnerability.
-
-use O_NOFOLLOW to open the existing lock file, so symbolic links
-aren't followed, thus avoid revealing if it point to an existing
-file.
-
-Signed-off-by: Matthieu Herrb <[email protected]>
-Reviewed-by: Alan Coopersmith <[email protected]>
----
- os/utils.c |    2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/os/utils.c b/os/utils.c
-index e8ecb71..fe49254 100644
---- a/os/utils.c
-+++ b/os/utils.c
-@@ -318,7 +318,7 @@ LockServer(void)
-       /*
-        * Read the pid from the existing file
-        */
--      lfd = open(LockFile, O_RDONLY);
-+      lfd = open(LockFile, O_RDONLY|O_NOFOLLOW);
-       if (lfd < 0) {
-         unlink(tmp);
-         FatalError("Can't read lock file %s\n", LockFile);
--- 
-1.7.3.2
-