summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/sqlite/files/CVE-2022-35737.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-support/sqlite/files/CVE-2022-35737.patch')
-rw-r--r--meta/recipes-support/sqlite/files/CVE-2022-35737.patch29
1 files changed, 29 insertions, 0 deletions
diff --git a/meta/recipes-support/sqlite/files/CVE-2022-35737.patch b/meta/recipes-support/sqlite/files/CVE-2022-35737.patch
new file mode 100644
index 0000000000..341e002913
--- /dev/null
+++ b/meta/recipes-support/sqlite/files/CVE-2022-35737.patch
@@ -0,0 +1,29 @@
1From 2bbf4c999dbb4b520561a57e0bafc19a15562093 Mon Sep 17 00:00:00 2001
2From: Hitendra Prajapati <hprajapati@mvista.com>
3Date: Fri, 2 Sep 2022 11:22:29 +0530
4Subject: [PATCH] CVE-2022-35737
5
6Upstream-Status: Backport [https://www.sqlite.org/src/info/aab790a16e1bdff7]
7CVE: CVE-2022-35737
8Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
9---
10 sqlite3.c | 3 ++-
11 1 file changed, 2 insertions(+), 1 deletion(-)
12
13diff --git a/sqlite3.c b/sqlite3.c
14index f664217..33dfb78 100644
15--- a/sqlite3.c
16+++ b/sqlite3.c
17@@ -28758,7 +28758,8 @@ SQLITE_API void sqlite3_str_vappendf(
18 case etSQLESCAPE: /* %q: Escape ' characters */
19 case etSQLESCAPE2: /* %Q: Escape ' and enclose in '...' */
20 case etSQLESCAPE3: { /* %w: Escape " characters */
21- int i, j, k, n, isnull;
22+ i64 i, j, k, n;
23+ int isnull;
24 int needQuote;
25 char ch;
26 char q = ((xtype==etSQLESCAPE3)?'"':'\''); /* Quote character */
27--
282.25.1
29