diff --git a/meta/recipes-support/sqlite/files/CVE-2023-7104.patch b/meta/recipes-support/sqlite/files/CVE-2023-7104.patch index 25c6ba017c8f3e8caf86e2634fbb29d61e100d66..5f3681070e8c1cb7ddbf709628ed30d86be09bc4 100644 --- a/meta/recipes-support/sqlite/files/CVE-2023-7104.patch +++ b/meta/recipes-support/sqlite/files/CVE-2023-7104.patch @@ -1,18 +1,20 @@ -From 09f1652f36c5c4e8a6a640ce887f9ea0f48a7958 Mon Sep 17 00:00:00 2001 +From f388a0c44d2abdbd582686e511fef36c1b96ae43 Mon Sep 17 00:00:00 2001 From: dan <Dan Kennedy> Date: Thu, 7 Sep 2023 13:53:09 +0000 Subject: [PATCH] Fix a buffer overread in the sessions extension that could occur when processing a corrupt changeset. Upstream-Status: Backport [https://sqlite.org/src/info/0e4e7a05c4204b47] -CVE: CVE-2022-46908 +CVE: CVE-2023-7104 + Signed-off-by: Peter Marko <peter.marko@siemens.com> +Signed-off-by: Vrushti Dabhi <vrushti.dabhi@einfochips.com> --- sqlite3.c | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) -diff --git a/ext/session/sqlite3session.c b/ext/session/sqlite3session.c -index 9f862f2465..0491549231 100644 +diff --git a/sqlite3.c b/sqlite3.c +index a16db27..0b979f7 100644 --- a/sqlite3.c +++ b/sqlite3.c @@ -213482,15 +213482,19 @@ static int sessionReadRecord( diff --git a/meta/recipes-support/sqlite/sqlite3_3.38.5.bb b/meta/recipes-support/sqlite/sqlite3_3.38.5.bb index cece207eaeeda103a2fc7e7f17a2f94d2e9b2e39..b3d502936531b63aa25d3d4a42d6396a36714f0b 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.38.5.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.38.5.bb @@ -8,7 +8,7 @@ SRC_URI = "http://www.sqlite.org/2022/sqlite-autoconf-${SQLITE_PV}.tar.gz \ file://CVE-2022-46908.patch \ file://CVE-2023-36191.patch \ file://CVE-2023-7104.patch \ -" + " SRC_URI[sha256sum] = "5af07de982ba658fd91a03170c945f99c971f6955bc79df3266544373e39869c" # -19242 is only an issue in specific development branch commits