diff -r 687fad3a623f -r 7a7a374453e5 open-src/xserver/xorg/CVE-2011-4028.patch --- a/open-src/xserver/xorg/CVE-2011-4028.patch Wed Sep 25 10:37:28 2013 -0700 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,31 +0,0 @@ -From 6ba44b91e37622ef8c146d8f2ac92d708a18ed34 Mon Sep 17 00:00:00 2001 -From: Matthieu Herrb -Date: Mon, 17 Oct 2011 22:26:12 +0200 -Subject: [PATCH 1/2] Fix CVE-2011-4028: File disclosure vulnerability. - -use O_NOFOLLOW to open the existing lock file, so symbolic links -aren't followed, thus avoid revealing if it point to an existing -file. - -Signed-off-by: Matthieu Herrb -Reviewed-by: Alan Coopersmith ---- - os/utils.c | 2 +- - 1 files changed, 1 insertions(+), 1 deletions(-) - -diff --git a/os/utils.c b/os/utils.c -index e8ecb71..fe49254 100644 ---- a/os/utils.c -+++ b/os/utils.c -@@ -318,7 +318,7 @@ LockServer(void) - /* - * Read the pid from the existing file - */ -- lfd = open(LockFile, O_RDONLY); -+ lfd = open(LockFile, O_RDONLY|O_NOFOLLOW); - if (lfd < 0) { - unlink(tmp); - FatalError("Can't read lock file %s\n", LockFile); --- -1.7.3.2 -