Projects
Mega:23.09
sqlite
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 3
View file
_service:tar_scm:sqlite.spec
Changed
@@ -6,7 +6,7 @@ Name: sqlite Version: 3.37.2 -Release: 5 +Release: 7 Summary: Embeded SQL database License: Public Domain URL: http://www.sqlite.org/ @@ -21,6 +21,8 @@ Patch4: 0004-fix-memory-problem-in-the-rtree-test-suite.patch Patch5: 0005-fix-integer-overflow-on-gigabyte-string.patch Patch6: 0006-CVE-2022-46908.patch +Patch7: 0007-CVE-2023-36191.patch +Patch8: 0008-CVE-2023-7104.patch BuildRequires: gcc autoconf tcl tcl-devel BuildRequires: ncurses-devel readline-devel glibc-devel @@ -69,6 +71,8 @@ %patch4 -p1 %patch5 -p1 %patch6 -p1 +%patch7 -p1 +%patch8 -p1 rm -f %{name}-doc-%{extver}/sqlite.css~ || : @@ -143,6 +147,12 @@ %{_mandir}/man*/* %changelog +* Wed Jan 3 2024 mazhao <mazhao12@huawei.com> - 3.37.2-7 +- fix the CVE-2023-7104 + +* Mon Aug 7 2023 zhuwentao <zhuwentao5@huawei.com> - 3.37.2-6 +- fix the CVE-2023-36191 + * Fri Jan 13 2023 Wenlong Zhang<zhangwenlong@loongson.cn> - 3.37.2-5 - remove fail testcase for loongarch
View file
_service:tar_scm:0007-CVE-2023-36191.patch
Added
@@ -0,0 +1,32 @@ +From 1b2901722e5de3ef8d29edb4481327e48bd3363c Mon Sep 17 00:00:00 2001 +From: zwtmichael <zhuwentao5@huawei.com> +Date: Mon, 7 Aug 2023 15:10:32 +0800 +Subject: PATCH fix segmentation violation + +Signed-off-by: zwtmichael <zhuwentao5@huawei.com> +--- + src/shell.c.in | 8 ++++++-- + 1 file changed, 6 insertions(+), 2 deletions(-) + +diff --git a/src/shell.c.in b/src/shell.c.in +index 543141c..d278988 100644 +--- a/src/shell.c.in ++++ b/src/shell.c.in +@@ -11469,8 +11469,12 @@ int SQLITE_CDECL wmain(int argc, wchar_t **wargv){ + }else if( strcmp(z,"-bail")==0 ){ + bail_on_error = 1; + }else if( strcmp(z,"-nonce")==0 ){ +- free(data.zNonce); +- data.zNonce = strdup(argv++i); ++ if( data.zNonce ) free(data.zNonce); ++ if( i+1 < argc ) data.zNonce = strdup(argv++i); ++ else{ ++ data.zNonce = 0; ++ break; ++ } + }else if( strcmp(z,"-safe")==0 ){ + /* no-op - catch this on the second pass */ + } +-- +2.34.1.windows.1 +
View file
_service:tar_scm:0008-CVE-2023-7104.patch
Added
@@ -0,0 +1,45 @@ +it From a756d158b3e55831975feb45b753ba499d2adeda Mon Sep 17 00:00:00 2001 +From: mazhao <mazhao12@huawei.com> +Date: Wed, 3 Jan 2024 12:00:45 +0800 +Subject: PATCH Fix a buffer overread in the sessions extension that could + occur when processing a corrupt changeset. + +Signed-off-by: mazhao <mazhao12@huawei.com> +--- + ext/session/sqlite3session.c | 18 +++++++++++------- + 1 file changed, 11 insertions(+), 7 deletions(-) + +diff --git a/ext/session/sqlite3session.c b/ext/session/sqlite3session.c +index a892804..72ad427 100644 +--- a/ext/session/sqlite3session.c ++++ b/ext/session/sqlite3session.c +@@ -3050,15 +3050,19 @@ static int sessionReadRecord( + } + } + if( eType==SQLITE_INTEGER || eType==SQLITE_FLOAT ){ +- sqlite3_int64 v = sessionGetI64(aVal); +- if( eType==SQLITE_INTEGER ){ +- sqlite3VdbeMemSetInt64(apOuti, v); ++ if( (pIn->nData-pIn->iNext)<8 ){ ++ rc = SQLITE_CORRUPT_BKPT; + }else{ +- double d; +- memcpy(&d, &v, 8); +- sqlite3VdbeMemSetDouble(apOuti, d); ++ sqlite3_int64 v = sessionGetI64(aVal); ++ if( eType==SQLITE_INTEGER ){ ++ sqlite3VdbeMemSetInt64(apOuti, v); ++ }else{ ++ double d; ++ memcpy(&d, &v, 8); ++ sqlite3VdbeMemSetDouble(apOuti, d); ++ } ++ pIn->iNext += 8; + } +- pIn->iNext += 8; + } + } + } +-- +2.34.1 +
View file
_service
Changed
@@ -2,7 +2,7 @@ <service name="tar_scm"> <param name="url">git@gitee.com:src-openeuler/sqlite.git</param> <param name="scm">git</param> - <param name="revision">openEuler-23.09</param> + <param name="revision">master</param> <param name="exclude">*</param> <param name="extract">*</param> </service>
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.
浙ICP备2022010568号-2