From 483711e676cd063a873179bdb2daedf56de0aa75 Mon Sep 17 00:00:00 2001 From: "Maxin B. John" Date: Fri, 10 Nov 2017 14:00:27 +0200 Subject: sqlite3: upgrade to 3.21.0 Remove upstreamed patch: 1. sqlite3-fix-CVE-2017-13685.patch Signed-off-by: Maxin B. John Signed-off-by: Ross Burton --- .../sqlite/files/sqlite3-fix-CVE-2017-13685.patch | 57 ---------------------- meta/recipes-support/sqlite/sqlite3_3.20.0.bb | 11 ----- meta/recipes-support/sqlite/sqlite3_3.21.0.bb | 10 ++++ 3 files changed, 10 insertions(+), 68 deletions(-) delete mode 100644 meta/recipes-support/sqlite/files/sqlite3-fix-CVE-2017-13685.patch delete mode 100644 meta/recipes-support/sqlite/sqlite3_3.20.0.bb create mode 100644 meta/recipes-support/sqlite/sqlite3_3.21.0.bb diff --git a/meta/recipes-support/sqlite/files/sqlite3-fix-CVE-2017-13685.patch b/meta/recipes-support/sqlite/files/sqlite3-fix-CVE-2017-13685.patch deleted file mode 100644 index aac428c821..0000000000 --- a/meta/recipes-support/sqlite/files/sqlite3-fix-CVE-2017-13685.patch +++ /dev/null @@ -1,57 +0,0 @@ -Fix CVE-2017-13685 - -The dump_callback function in SQLite 3.20.0 allows remote attackers to -cause a denial of service (EXC_BAD_ACCESS and application crash) via a -crafted file. - -References: -https://sqlite.org/src/info/02f0f4c54f2819b3 -http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html - -Upstream-Status: Backport [https://sqlite.org/src/info/cf0d3715caac9149] - -CVE: CVE-2017-13685 - -Signed-off-by: Wenzong Fan - -Index: src/shell.c -================================================================== ---- src/shell.c -+++ src/shell.c -@@ -2657,10 +2657,11 @@ - int *aiType /* Column types */ - ){ - int i; - ShellState *p = (ShellState*)pArg; - -+ if( azArg==0 ) return 0; - switch( p->cMode ){ - case MODE_Line: { - int w = 5; - if( azArg==0 ) break; - for(i=0; in ) appendText(p, "|", 0); - for(i=0; i