diff options
author | Anuj Mittal <anuj.mittal@intel.com> | 2020-02-04 13:51:45 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2020-02-05 12:00:34 +0000 |
commit | 73333dd4b8f80f9d6224b319f476a7bf0e27b83c (patch) | |
tree | 0d508c160ed67efaa95010759108ce6792b7e718 /meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch | |
parent | 0ca68e153dc933878c805d7bda6c72b55043fd12 (diff) | |
download | poky-73333dd4b8f80f9d6224b319f476a7bf0e27b83c.tar.gz |
sqlite3: upgrade 3.30.1 -> 3.31.1
(From OE-Core rev: 621ea68239763ce8740731e745c5002c956d4c67)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch')
-rw-r--r-- | meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch | 46 |
1 files changed, 0 insertions, 46 deletions
diff --git a/meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch b/meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch deleted file mode 100644 index cba8ec9d30..0000000000 --- a/meta/recipes-support/sqlite/sqlite3/CVE-2019-19959.patch +++ /dev/null | |||
@@ -1,46 +0,0 @@ | |||
1 | CVE: CVE-2019-19959 | ||
2 | Upstream-Status: Backport | ||
3 | Signed-off-by: Ross Burton <ross.burton@intel.com> | ||
4 | |||
5 | From f83f7e8141ee7cbbf7f2dc8985279a7372b259b6 Mon Sep 17 00:00:00 2001 | ||
6 | From: "D. Richard Hipp" <drh@hwaci.com> | ||
7 | Date: Mon, 23 Dec 2019 21:04:33 +0000 | ||
8 | Subject: [PATCH] Fix the zipfile() function in the zipfile extension so that | ||
9 | it is able to deal with goofy filenames that contain embedded zeros. | ||
10 | |||
11 | FossilOrigin-Name: cc0fb00a128fd0773db5ff7891f7aa577a3671d570166d2cbb30df922344adcf | ||
12 | --- | ||
13 | shell.c | 4 ++-- | ||
14 | sqlite3.c | 4 ++-- | ||
15 | sqlite3.h | 2 +- | ||
16 | 3 files changed, 5 insertions(+), 5 deletions(-) | ||
17 | |||
18 | diff --git a/shell.c b/shell.c | ||
19 | index 404a8d4..48065e9 100644 | ||
20 | --- a/shell.c | ||
21 | +++ b/shell.c | ||
22 | @@ -5841,7 +5841,7 @@ static int zipfileUpdate( | ||
23 | zFree = sqlite3_mprintf("%s/", zPath); | ||
24 | if( zFree==0 ){ rc = SQLITE_NOMEM; } | ||
25 | zPath = (const char*)zFree; | ||
26 | - nPath++; | ||
27 | + nPath = (int)strlen(zPath); | ||
28 | } | ||
29 | } | ||
30 | |||
31 | @@ -6242,11 +6242,11 @@ void zipfileStep(sqlite3_context *pCtx, int nVal, sqlite3_value **apVal){ | ||
32 | }else{ | ||
33 | if( zName[nName-1]!='/' ){ | ||
34 | zName = zFree = sqlite3_mprintf("%s/", zName); | ||
35 | - nName++; | ||
36 | if( zName==0 ){ | ||
37 | rc = SQLITE_NOMEM; | ||
38 | goto zipfile_step_out; | ||
39 | } | ||
40 | + nName = (int)strlen(zName); | ||
41 | }else{ | ||
42 | while( nName>1 && zName[nName-2]=='/' ) nName--; | ||
43 | } | ||
44 | -- | ||
45 | 2.24.1 | ||
46 | |||