mirror of
https://git.yoctoproject.org/poky
synced 2026-02-28 12:29:40 +01:00
Backport https://sqlite.org/src/info/0e4e7a05c4204b47 (From OE-Core rev: 2a418c0a55d0d4e9a70a41c9a7cfea97ec0edee9) Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
47 lines
1.3 KiB
Diff
47 lines
1.3 KiB
Diff
From eab426c5fba69d2c77023939f72b4ad446834e3c Mon Sep 17 00:00:00 2001
|
|
From: dan <Dan Kennedy>
|
|
Date: Thu, 7 Sep 2023 13:53:09 +0000
|
|
Subject: [PATCH] Fix a buffer overread in the sessions extension that could occur when processing a corrupt changeset.
|
|
|
|
Upstream-Status: Backport [https://sqlite.org/src/info/0e4e7a05c4204b47]
|
|
CVE: CVE-2023-7104
|
|
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
|
|
---
|
|
sqlite3.c | 18 +++++++++++-------
|
|
1 file changed, 11 insertions(+), 7 deletions(-)
|
|
|
|
diff --git a/sqlite3.c b/sqlite3.c
|
|
index 972ef18..c645ac8 100644
|
|
--- a/sqlite3.c
|
|
+++ b/sqlite3.c
|
|
@@ -203301,15 +203301,19 @@ static int sessionReadRecord(
|
|
}
|
|
}
|
|
if( eType==SQLITE_INTEGER || eType==SQLITE_FLOAT ){
|
|
- sqlite3_int64 v = sessionGetI64(aVal);
|
|
- if( eType==SQLITE_INTEGER ){
|
|
- sqlite3VdbeMemSetInt64(apOut[i], v);
|
|
+ if( (pIn->nData-pIn->iNext)<8 ){
|
|
+ rc = SQLITE_CORRUPT_BKPT;
|
|
}else{
|
|
- double d;
|
|
- memcpy(&d, &v, 8);
|
|
- sqlite3VdbeMemSetDouble(apOut[i], d);
|
|
+ sqlite3_int64 v = sessionGetI64(aVal);
|
|
+ if( eType==SQLITE_INTEGER ){
|
|
+ sqlite3VdbeMemSetInt64(apOut[i], v);
|
|
+ }else{
|
|
+ double d;
|
|
+ memcpy(&d, &v, 8);
|
|
+ sqlite3VdbeMemSetDouble(apOut[i], d);
|
|
+ }
|
|
+ pIn->iNext += 8;
|
|
}
|
|
- pIn->iNext += 8;
|
|
}
|
|
}
|
|
}
|
|
--
|
|
2.25.1
|
|
|