summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch')
-rw-r--r--meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch29
1 files changed, 29 insertions, 0 deletions
diff --git a/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch b/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch
new file mode 100644
index 0000000000..b8225b5069
--- /dev/null
+++ b/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch
@@ -0,0 +1,29 @@
1From d7f45414935e4ef6e3361f02a22876f1ee7a04aa Mon Sep 17 00:00:00 2001
2From: drh <>
3Date: Sun, 16 Feb 2025 10:57:25 +0000
4Subject: [PATCH] Add a typecast to avoid 32-bit integer overflow in the
5 concat_ws() function with an enormous separator values and many arguments.
6
7FossilOrigin-Name: 498e3f1cf57f164fbd8380e92bf91b9f26d6aa05d092fcd135d754abf1e5b1b5
8
9CVE: CVE-2025-3277
10CVE: CVE-2025-29087
11Upstream-Status: Backport [https://sqlite.org/src/info/498e3f1cf57f164f]
12Signed-off-by: Peter Marko <peter.marko@siemens.com>
13---
14 sqlite3.c | 2 +-
15 1 file changed, 1 insertion(+), 1 deletion(-)
16
17diff --git a/sqlite3.c b/sqlite3.c
18index 08c593e55c..24d0d954d9 100644
19--- a/sqlite3.c
20+++ b/sqlite3.c
21@@ -129594,7 +129594,7 @@ static void concatFuncCore(
22 for(i=0; i<argc; i++){
23 n += sqlite3_value_bytes(argv[i]);
24 }
25- n += (argc-1)*nSep;
26+ n += (argc-1)*(i64)nSep;
27 z = sqlite3_malloc64(n+1);
28 if( z==0 ){
29 sqlite3_result_error_nomem(context);