Projects
Mega:24.09
sqlite
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
Expand all
Collapse all
Changes of Revision 3
View file
_service:tar_scm:sqlite.spec
Changed
@@ -6,7 +6,7 @@ Name: sqlite Version: 3.42.0 -Release: 1 +Release: 2 Summary: Embeded SQL database License: Public Domain URL: http://www.sqlite.org/ @@ -15,6 +15,8 @@ Source1: http://www.sqlite.org/2023/sqlite-doc-%{extver}.zip Source2: https://www.sqlite.org/2023/sqlite-autoconf-%{extver}.tar.gz +Patch1: 0001-CVE-2023-7104.patch + BuildRequires: gcc autoconf tcl tcl-devel BuildRequires: ncurses-devel readline-devel glibc-devel @@ -56,6 +58,7 @@ %prep #autosetup will fail because of 2 zip files %setup -q -a1 -n %{name}-src-%{extver} +%patch1 -p1 rm -f %{name}-doc-%{extver}/sqlite.css~ || : @@ -130,6 +133,9 @@ %{_mandir}/man*/* %changelog +* Wed Sep 4 2024 wangmian <wangmian19@h-partners.com> - 3.42.0-2 +- sync the CVE-2023-7104 from 2203 + * Tue Feb 27 2024 Zheng Zhenyu <zheng.zhenyu@outlook.com> - 3.42.0-1 - Bump version to fix CVE-2024-0232
View file
_service:tar_scm:0001-CVE-2023-7104.patch
Added
@@ -0,0 +1,45 @@ +it From a756d158b3e55831975feb45b753ba499d2adeda Mon Sep 17 00:00:00 2001 +From: mazhao <mazhao12@huawei.com> +Date: Wed, 3 Jan 2024 12:00:45 +0800 +Subject: PATCH Fix a buffer overread in the sessions extension that could + occur when processing a corrupt changeset. + +Signed-off-by: mazhao <mazhao12@huawei.com> +--- + ext/session/sqlite3session.c | 18 +++++++++++------- + 1 file changed, 11 insertions(+), 7 deletions(-) + +diff --git a/ext/session/sqlite3session.c b/ext/session/sqlite3session.c +index a892804..72ad427 100644 +--- a/ext/session/sqlite3session.c ++++ b/ext/session/sqlite3session.c +@@ -3050,15 +3050,19 @@ static int sessionReadRecord( + } + } + if( eType==SQLITE_INTEGER || eType==SQLITE_FLOAT ){ +- sqlite3_int64 v = sessionGetI64(aVal); +- if( eType==SQLITE_INTEGER ){ +- sqlite3VdbeMemSetInt64(apOuti, v); ++ if( (pIn->nData-pIn->iNext)<8 ){ ++ rc = SQLITE_CORRUPT_BKPT; + }else{ +- double d; +- memcpy(&d, &v, 8); +- sqlite3VdbeMemSetDouble(apOuti, d); ++ sqlite3_int64 v = sessionGetI64(aVal); ++ if( eType==SQLITE_INTEGER ){ ++ sqlite3VdbeMemSetInt64(apOuti, v); ++ }else{ ++ double d; ++ memcpy(&d, &v, 8); ++ sqlite3VdbeMemSetDouble(apOuti, d); ++ } ++ pIn->iNext += 8; + } +- pIn->iNext += 8; + } + } + } +-- +2.34.1 +
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.
浙ICP备2022010568号-2