diff options
author | Peter Marko <peter.marko@siemens.com> | 2025-04-18 20:35:01 +0200 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-04-28 08:18:53 -0700 |
commit | 72bb9edc9a5a067d2384c20cc5e7d18659c14d0c (patch) | |
tree | 8238f25763dd891b91d4124d52c38cb86edd0895 /meta | |
parent | f261fbc7a6bae02b0ba980e60092e06925baa2cd (diff) | |
download | poky-72bb9edc9a5a067d2384c20cc5e7d18659c14d0c.tar.gz |
sqlite3: patch CVE-2025-3277
Pick commit [1] mentioned in [2].
[1] https://sqlite.org/src/info/498e3f1cf57f164f
[2] https://nvd.nist.gov/vuln/detail/CVE-2025-3277
(From OE-Core rev: 2f800295919ac337f038e1678f4c0abb2a6e7f95)
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch | 28 | ||||
-rw-r--r-- | meta/recipes-support/sqlite/sqlite3_3.45.3.bb | 4 |
2 files changed, 31 insertions, 1 deletions
diff --git a/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch b/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch new file mode 100644 index 0000000000..4e2ed5f1e0 --- /dev/null +++ b/meta/recipes-support/sqlite/sqlite3/CVE-2025-3277.patch | |||
@@ -0,0 +1,28 @@ | |||
1 | From d7f45414935e4ef6e3361f02a22876f1ee7a04aa Mon Sep 17 00:00:00 2001 | ||
2 | From: drh <> | ||
3 | Date: Sun, 16 Feb 2025 10:57:25 +0000 | ||
4 | Subject: [PATCH] Add a typecast to avoid 32-bit integer overflow in the | ||
5 | concat_ws() function with an enormous separator values and many arguments. | ||
6 | |||
7 | FossilOrigin-Name: 498e3f1cf57f164fbd8380e92bf91b9f26d6aa05d092fcd135d754abf1e5b1b5 | ||
8 | |||
9 | CVE: CVE-2025-3277 | ||
10 | Upstream-Status: Backport [https://sqlite.org/src/info/498e3f1cf57f164f] | ||
11 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
12 | --- | ||
13 | sqlite3.c | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/sqlite3.c b/sqlite3.c | ||
17 | index 08c593e55c..24d0d954d9 100644 | ||
18 | --- a/sqlite3.c | ||
19 | +++ b/sqlite3.c | ||
20 | @@ -129594,7 +129594,7 @@ static void concatFuncCore( | ||
21 | for(i=0; i<argc; i++){ | ||
22 | n += sqlite3_value_bytes(argv[i]); | ||
23 | } | ||
24 | - n += (argc-1)*nSep; | ||
25 | + n += (argc-1)*(i64)nSep; | ||
26 | z = sqlite3_malloc64(n+1); | ||
27 | if( z==0 ){ | ||
28 | sqlite3_result_error_nomem(context); | ||
diff --git a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb index 03d70bbd38..0e91167eef 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb | |||
@@ -3,6 +3,8 @@ require sqlite3.inc | |||
3 | LICENSE = "PD" | 3 | LICENSE = "PD" |
4 | LIC_FILES_CHKSUM = "file://sqlite3.h;endline=11;md5=786d3dc581eff03f4fd9e4a77ed00c66" | 4 | LIC_FILES_CHKSUM = "file://sqlite3.h;endline=11;md5=786d3dc581eff03f4fd9e4a77ed00c66" |
5 | 5 | ||
6 | SRC_URI = "http://www.sqlite.org/2024/sqlite-autoconf-${SQLITE_PV}.tar.gz" | 6 | SRC_URI = "http://www.sqlite.org/2024/sqlite-autoconf-${SQLITE_PV}.tar.gz \ |
7 | file://CVE-2025-3277.patch \ | ||
8 | " | ||
7 | SRC_URI[sha256sum] = "b2809ca53124c19c60f42bf627736eae011afdcc205bb48270a5ee9a38191531" | 9 | SRC_URI[sha256sum] = "b2809ca53124c19c60f42bf627736eae011afdcc205bb48270a5ee9a38191531" |
8 | 10 | ||