From 1aca02b51ef30af68755f5aed7f3ebe5d6ffae48 Mon Sep 17 00:00:00 2001 From: adisbladis Date: Sun, 7 Jan 2018 04:25:00 +0800 Subject: [PATCH] openslp: Fix CVE-2016-4912 --- .../development/libraries/openslp/CVE-2016-4912.patch | 11 +++++++++++ pkgs/development/libraries/openslp/default.nix | 1 + 2 files changed, 12 insertions(+) create mode 100644 pkgs/development/libraries/openslp/CVE-2016-4912.patch diff --git a/pkgs/development/libraries/openslp/CVE-2016-4912.patch b/pkgs/development/libraries/openslp/CVE-2016-4912.patch new file mode 100644 index 000000000000..06223deda89b --- /dev/null +++ b/pkgs/development/libraries/openslp/CVE-2016-4912.patch @@ -0,0 +1,11 @@ +--- a/common/slp_xmalloc.c ++++ b/common/slp_xmalloc.c +@@ -206,7 +206,7 @@ void * _xrealloc(const char * file, int line, void * ptr, size_t size) + if (newptr == 0) + return 0; + memcpy(newptr, ptr, x->size); +- _xfree(file, line, x); ++ _xfree(file, line, ptr); + } + return newptr; + } diff --git a/pkgs/development/libraries/openslp/default.nix b/pkgs/development/libraries/openslp/default.nix index 3ab3f68cde5e..3e178d92013e 100644 --- a/pkgs/development/libraries/openslp/default.nix +++ b/pkgs/development/libraries/openslp/default.nix @@ -19,6 +19,7 @@ stdenv.mkDerivation { url = "https://src.fedoraproject.org/cgit/rpms/openslp.git/plain/openslp-2.0.0-cve-2016-7567.patch"; sha256 = "0zp61axx93b7nrbsyhn2x4dnw7n9y6g4rys21hyqxk4khrnc2yr9"; }) + ./CVE-2016-4912.patch ]; meta = with stdenv.lib; {