mirror of
https://git.yoctoproject.org/git/poky
synced 2026-01-04 16:10:04 +00:00
sqlite3: fix CVE-2017-13685
The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file. Backport patch to fix the issue. Some references: https://sqlite.org/src/info/02f0f4c54f2819b3 http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html (From OE-Core rev: 9b9f566d2042f2b393de88506d2da964bc4d17b0) Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
parent
885fd98f0c
commit
55db269ae9
|
|
@ -0,0 +1,57 @@
|
|||
Fix CVE-2017-13685
|
||||
|
||||
The dump_callback function in SQLite 3.20.0 allows remote attackers to
|
||||
cause a denial of service (EXC_BAD_ACCESS and application crash) via a
|
||||
crafted file.
|
||||
|
||||
References:
|
||||
https://sqlite.org/src/info/02f0f4c54f2819b3
|
||||
http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
|
||||
|
||||
Upstream-Status: Backport [https://sqlite.org/src/info/cf0d3715caac9149]
|
||||
|
||||
CVE: CVE-2017-13685
|
||||
|
||||
Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com>
|
||||
|
||||
Index: src/shell.c
|
||||
==================================================================
|
||||
--- src/shell.c
|
||||
+++ src/shell.c
|
||||
@@ -2657,10 +2657,11 @@
|
||||
int *aiType /* Column types */
|
||||
){
|
||||
int i;
|
||||
ShellState *p = (ShellState*)pArg;
|
||||
|
||||
+ if( azArg==0 ) return 0;
|
||||
switch( p->cMode ){
|
||||
case MODE_Line: {
|
||||
int w = 5;
|
||||
if( azArg==0 ) break;
|
||||
for(i=0; i<nArg; i++){
|
||||
@@ -3007,10 +3008,11 @@
|
||||
*/
|
||||
static int captureOutputCallback(void *pArg, int nArg, char **azArg, char **az){
|
||||
ShellText *p = (ShellText*)pArg;
|
||||
int i;
|
||||
UNUSED_PARAMETER(az);
|
||||
+ if( azArg==0 ) return 0;
|
||||
if( p->n ) appendText(p, "|", 0);
|
||||
for(i=0; i<nArg; i++){
|
||||
if( i ) appendText(p, ",", 0);
|
||||
if( azArg[i] ) appendText(p, azArg[i], 0);
|
||||
}
|
||||
@@ -3888,11 +3890,11 @@
|
||||
const char *zType;
|
||||
const char *zSql;
|
||||
ShellState *p = (ShellState *)pArg;
|
||||
|
||||
UNUSED_PARAMETER(azNotUsed);
|
||||
- if( nArg!=3 ) return 1;
|
||||
+ if( nArg!=3 || azArg==0 ) return 0;
|
||||
zTable = azArg[0];
|
||||
zType = azArg[1];
|
||||
zSql = azArg[2];
|
||||
|
||||
if( strcmp(zTable, "sqlite_sequence")==0 ){
|
||||
|
|
@ -5,6 +5,7 @@ LIC_FILES_CHKSUM = "file://sqlite3.h;endline=11;md5=786d3dc581eff03f4fd9e4a77ed0
|
|||
|
||||
SRC_URI = "\
|
||||
http://www.sqlite.org/2017/sqlite-autoconf-${SQLITE_PV}.tar.gz \
|
||||
file://sqlite3-fix-CVE-2017-13685.patch \
|
||||
"
|
||||
SRC_URI[md5sum] = "e262a28b73cc330e7e83520c8ce14e4d"
|
||||
SRC_URI[sha256sum] = "3814c6f629ff93968b2b37a70497cfe98b366bf587a2261a56a5f750af6ae6a0"
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user