Blame SOURCES/openslp-2.0.0-cve-2017-17833.patch

42efb7
diff -up openslp-2.0.0/slpd/slpd_process.c.orig openslp-2.0.0/slpd/slpd_process.c
42efb7
--- openslp-2.0.0/slpd/slpd_process.c.orig	2018-05-09 13:08:06.185104375 +0200
42efb7
+++ openslp-2.0.0/slpd/slpd_process.c	2018-05-09 13:07:21.017095089 +0200
42efb7
@@ -462,6 +462,15 @@ static int ProcessSrvRqst(SLPMessage * m
42efb7
          message->body.srvrqst.srvtype, 23, SLP_DA_SERVICE_TYPE) == 0)
42efb7
    {
42efb7
       errorcode = ProcessDASrvRqst(message, sendbuf, errorcode);
42efb7
+
42efb7
+      if (result != *sendbuf)
42efb7
+      {
42efb7
+         // The pointer stored at *sendbuf can be modified by a realloc
42efb7
+         // operation in ProcessDASrvRqst().  Fix up the local copy of
42efb7
+         // that pointer if necessary.
42efb7
+         result = *sendbuf;
42efb7
+      }
42efb7
+
42efb7
       if (errorcode == 0)
42efb7
       {
42efb7
          /* Since we have an errorcode of 0, we were successful,