diff options
| author | Sana Kazi <sana.kazi@kpit.com> | 2022-09-21 16:56:00 +0530 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-09-23 16:22:59 +0100 |
| commit | 915a752d3789fb3f3f4faa21fce9497e21d51401 (patch) | |
| tree | 6451c8cb390c5d4885d08736ea6caed065f372bb /meta | |
| parent | a8ee7ba022ed4f3cbc49cfce72511ee81d7acf00 (diff) | |
| download | poky-915a752d3789fb3f3f4faa21fce9497e21d51401.tar.gz | |
sqlite3: Fix CVE-2021-20223
Fix CVE-2021-20223 for sqlite3
Link: https://github.com/sqlite/sqlite/commit/d1d43efa4fb0f2098c0e2c5bf2e807c58d5ec05b.patch
(From OE-Core rev: b42ea2b7f9149f9066662e95fd0159d7c3d1fc84)
Signed-off-by: Sana Kazi <Sana.Kazi@kpit.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-support/sqlite/files/CVE-2021-20223.patch | 23 | ||||
| -rw-r--r-- | meta/recipes-support/sqlite/sqlite3_3.31.1.bb | 1 |
2 files changed, 24 insertions, 0 deletions
diff --git a/meta/recipes-support/sqlite/files/CVE-2021-20223.patch b/meta/recipes-support/sqlite/files/CVE-2021-20223.patch new file mode 100644 index 0000000000..e9d2e04d30 --- /dev/null +++ b/meta/recipes-support/sqlite/files/CVE-2021-20223.patch | |||
| @@ -0,0 +1,23 @@ | |||
| 1 | From d1d43efa4fb0f2098c0e2c5bf2e807c58d5ec05b Mon Sep 17 00:00:00 2001 | ||
| 2 | From: dan <dan@noemail.net> | ||
| 3 | Date: Mon, 26 Oct 2020 13:24:36 +0000 | ||
| 4 | Subject: [PATCH] Prevent fts5 tokenizer unicode61 from considering '\0' to be | ||
| 5 | a token characters, even if other characters of class "Cc" are. | ||
| 6 | |||
| 7 | FossilOrigin-Name: b7b7bde9b7a03665e3691c6d51118965f216d2dfb1617f138b9f9e60e418ed2f | ||
| 8 | |||
| 9 | CVE: CVE-2021-20223 | ||
| 10 | Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/d1d43efa4fb0f2098c0e2c5bf2e807c58d5ec05b.patch] | ||
| 11 | Comment: Removed manifest, manifest.uuid and fts5tok1.test as these files are not present in the amalgamated source code | ||
| 12 | Signed-Off-by: Sana.Kazi@kpit.com | ||
| 13 | --- | ||
| 14 | --- a/sqlite3.c 2022-09-09 13:54:30.010768197 +0530 | ||
| 15 | +++ b/sqlite3.c 2022-09-09 13:56:25.458769142 +0530 | ||
| 16 | @@ -227114,6 +227114,7 @@ | ||
| 17 | } | ||
| 18 | iTbl++; | ||
| 19 | } | ||
| 20 | + aAscii[0] = 0; /* 0x00 is never a token character */ | ||
| 21 | } | ||
| 22 | |||
| 23 | /* | ||
diff --git a/meta/recipes-support/sqlite/sqlite3_3.31.1.bb b/meta/recipes-support/sqlite/sqlite3_3.31.1.bb index d9e98c9120..ef12ef0db2 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.31.1.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.31.1.bb | |||
| @@ -16,6 +16,7 @@ SRC_URI = "http://www.sqlite.org/2020/sqlite-autoconf-${SQLITE_PV}.tar.gz \ | |||
| 16 | file://CVE-2022-35737.patch \ | 16 | file://CVE-2022-35737.patch \ |
| 17 | file://CVE-2020-35525.patch \ | 17 | file://CVE-2020-35525.patch \ |
| 18 | file://CVE-2020-35527.patch \ | 18 | file://CVE-2020-35527.patch \ |
| 19 | file://CVE-2021-20223.patch \ | ||
| 19 | " | 20 | " |
| 20 | SRC_URI[md5sum] = "2d0a553534c521504e3ac3ad3b90f125" | 21 | SRC_URI[md5sum] = "2d0a553534c521504e3ac3ad3b90f125" |
| 21 | SRC_URI[sha256sum] = "62284efebc05a76f909c580ffa5c008a7d22a1287285d68b7825a2b6b51949ae" | 22 | SRC_URI[sha256sum] = "62284efebc05a76f909c580ffa5c008a7d22a1287285d68b7825a2b6b51949ae" |
