update sqlite.spec.
This commit is contained in:
parent
014003e808
commit
fef5deb7a0
269
sqlite.spec
269
sqlite.spec
@ -6,7 +6,7 @@
|
||||
|
||||
Name: sqlite
|
||||
Version: 3.24.0
|
||||
Release: 11
|
||||
Release: 12
|
||||
Summary: Embeded SQL database
|
||||
License: Public Domain
|
||||
URL: http://www.sqlite.org/
|
||||
@ -15,72 +15,71 @@ Source0: http://www.sqlite.org/2018/sqlite-src-%{extver}.zip
|
||||
Source1: http://www.sqlite.org/2018/sqlite-doc-%{extver}.zip
|
||||
Source2: https://www.sqlite.org/2018/sqlite-autoconf-%{extver}.tar.gz
|
||||
|
||||
Patch0000: 0000-sqlite-no-malloc-usable-size.patch
|
||||
Patch0001: 0001-sqlite-CVE-2018-20346.patch
|
||||
Patch0002: 0002-remove-fail-testcase-in-no-free-fd-situation.patch
|
||||
|
||||
Patch6000: 6000-Fix-the-sqlite3BeginTrans-calls-within-the-snapshot-.patch
|
||||
Patch6001: 6001-Change-a-comma-into-a-logically-equivalent-but-seman.patch
|
||||
Patch6002: 6002-Fix-a-typo-in-the-amalgamation-autoconf-file.patch
|
||||
Patch6003: 6003-Fix-typo-in-the-normalize-extension.patch
|
||||
Patch6004: 6004-Fix-a-minor-problem-in-the-code-for-determining-whet.patch
|
||||
Patch6005: 6005-Quick-patch-to-the-Lemon-parser-template-to-avoid-an.patch
|
||||
Patch6006: 6006-Fix-typo-in-the-Win32-specific-code-for-the-fileio-e.patch
|
||||
Patch6007: 6007-Fix-a-problem-causing-ENABLE_CURSOR_HINTS-builds-to-.patch
|
||||
Patch6008: 6008-Fix-a-potential-crash-that-can-occur-while-reading-a.patch
|
||||
Patch6009: 6009-In-the-CLI-fix-a-file-descriptor-leak-following-OOM-.patch
|
||||
Patch6010: 6010-Take-steps-to-avoid-a-potential-integer-overflow-in-.patch
|
||||
Patch6011: 6011-Fix-minor-memory-leak-in-the-dbstat-extension-that-c.patch
|
||||
Patch6012: 6012-Fix-a-failing-assert-in-sqlite3ResetAllSchemasOfConn.patch
|
||||
Patch6013: 6013-Fix-a-parser-bug-in-the-use-of-parentheses-around-ta.patch
|
||||
Patch6014: 6014-Fix-possible-integer-overflow-while-running-PRAGMA-i.patch
|
||||
Patch6015: 6015-Fix-a-segfault-caused-by-using-the-RAISE-function-in.patch
|
||||
Patch6016: 6016-Fix-another-problem-with-corrupt-database-handling-i.patch
|
||||
Patch6017: 6017-Fix-a-buffer-overwrite-in-fts5-triggered-by-a-corrup.patch
|
||||
Patch6018: 6018-Fix-another-case-in-fts5-where-a-corrupt-database-co.patch
|
||||
Patch6019: 6019-Fix-another-potential-buffer-overread-in-fts5.patch
|
||||
Patch6020: 6020-Fix-a-possible-memory-leak-when-trying-to-UPDATE-a-c.patch
|
||||
Patch6021: 6021-Fix-an-out-of-bounds-read-in-SQL-function-fts5_decod.patch
|
||||
Patch6022: 6022-Fix-a-segfault-in-fts3-prompted-by-a-corrupted-datab.patch
|
||||
Patch6023: 6023-Prevent-unsigned-32-bit-integer-overflow-from-leadin.patch
|
||||
Patch6024: 6024-Fix-a-problem-causing-a-crash-if-an-fts5vocab-table-.patch
|
||||
Patch6025: 6025-Fix-a-harmless-memory-leak-in-the-Lemon-parser-gener.patch
|
||||
Patch6026: 6026-Handle-SQL-NULL-values-without-crashing-in-the-fts5-.patch
|
||||
Patch6027: 6027-Fix-a-memory-leak-that-could-occur-in-fts3-when-hand.patch
|
||||
Patch6028: 6028-Fix-a-buffer-overwrite-that-could-occur-when-running.patch
|
||||
Patch6029: 6029-Fix-another-corruption-related-crash-in-fts5.patch
|
||||
Patch6030: 6030-Avoid-integer-overflow-when-computing-the-array-of-a.patch
|
||||
Patch6031: 6031-Fix-another-segfault-caused-by-a-corrupt-fts3-databa.patch
|
||||
Patch6032: 6032-Fix-a-buffer-overrun-that-could-occur-in-fts5-if-a-p.patch
|
||||
Patch6033: 6033-Fix-another-fts5-crash-that-can-occur-if-the-databas.patch
|
||||
Patch6034: 6034-Fix-an-assert-in-vdbemem.c-that-could-fire-if-the-da.patch
|
||||
Patch6035: 6035-Fix-a-potential-problem-with-INSERT-INTO-.-SELECT-FR.patch
|
||||
Patch6036: 6036-Fix-a-segfault-that-could-follow-an-OOM-when-queryin.patch
|
||||
Patch6037: 6037-Fix-a-buffer-overread-in-fts3-that-could-occur-when-.patch
|
||||
Patch6038: 6038-Fix-a-buffer-overrun-triggered-by-a-merge-operation-.patch
|
||||
Patch6039: 6039-Fix-another-buffer-overread-in-fts5-that-may-occur-w.patch
|
||||
Patch6040: 6040-Fix-another-buffer-overrun-that-could-occur-when-que.patch
|
||||
Patch6041: 6041-Fix-another-segfault-that-could-occur-in-fts5-with-a.patch
|
||||
Patch6042: 6042-Fix-a-potential-memory-leak-in-RBU-if-the-rbu_fossil.patch
|
||||
Patch6043: 6043-Fix-a-potential-32-bit-integer-overflow-in-the-showd.patch
|
||||
Patch6044: 6044-sqlite-CVE-2019-8457-out-of-bounds-read.patch
|
||||
Patch6045: 6045-sqlite-CVE-2019-16168.patch
|
||||
Patch6046: 6046-Fix-CVE-2019-19646.patch
|
||||
Patch6047: 6047-Fix-CVE-2019-9936.patch
|
||||
Patch6048: 6048-Fix-CVE-2019-9937.patch
|
||||
Patch6049: 6049-Fix-CVE-2019-19923-Continue-to-back-away-from-the-LEFT-JOIN-optimizatio.patch
|
||||
Patch6050: 6050-Fix-CVE-2019-19924-When-an-error-occurs-while-rewriting-the-parser-tree.patch
|
||||
Patch6051: 6051-Fix-CVE-2019-19925-Fix-the-zipfile-extension-so-that-INSERT-works-even-.patch
|
||||
Patch6052: 6052-Fix-CVE-2019-19926-Continuation-of-e2bddcd4c55ba3cb-Add-another-spot-wh.patch
|
||||
Patch6053: 6053-Fix-CVE-2019-20218-Do-not-attempt-to-unwind-the-WITH-stack-in-the-Parse.patch
|
||||
Patch6054: 6054-Fix-the-zipfile-function-in-the-zipfile-extension-so.patch
|
||||
Patch6055: 6055-Fix-CVE-2018-20505.patch
|
||||
Patch6056: 6056-Fix-CVE-2020-9327.patch
|
||||
Patch6057: 6057-Fix-CVE-2020-11655.patch
|
||||
Patch6058: 6058-Fix-CVE-2020-13434.patch
|
||||
Patch6059: 6059-Fix-CVE-2020-13435.patch
|
||||
Patch6060: 6060-Fix-CVE-2020-13630.patch
|
||||
Patch6061: 6061-Fix-CVE-2020-13632.patch
|
||||
Patch0: 0000-sqlite-no-malloc-usable-size.patch
|
||||
Patch1: 0001-sqlite-CVE-2018-20346.patch
|
||||
Patch2: 0002-remove-fail-testcase-in-no-free-fd-situation.patch
|
||||
Patch3: 0003-Fix-the-sqlite3BeginTrans-calls-within-the-snapshot-.patch
|
||||
Patch4: 0004-Change-a-comma-into-a-logically-equivalent-but-seman.patch
|
||||
Patch5: 0005-Fix-a-typo-in-the-amalgamation-autoconf-file.patch
|
||||
Patch6: 0006-Fix-typo-in-the-normalize-extension.patch
|
||||
Patch7: 0007-Fix-a-minor-problem-in-the-code-for-determining-whet.patch
|
||||
Patch8: 0008-Quick-patch-to-the-Lemon-parser-template-to-avoid-an.patch
|
||||
Patch9: 0009-Fix-typo-in-the-Win32-specific-code-for-the-fileio-e.patch
|
||||
Patch10: 0010-Fix-a-problem-causing-ENABLE_CURSOR_HINTS-builds-to-.patch
|
||||
Patch11: 0011-Fix-a-potential-crash-that-can-occur-while-reading-a.patch
|
||||
Patch12: 0012-In-the-CLI-fix-a-file-descriptor-leak-following-OOM-.patch
|
||||
Patch13: 0013-Take-steps-to-avoid-a-potential-integer-overflow-in-.patch
|
||||
Patch14: 0014-Fix-minor-memory-leak-in-the-dbstat-extension-that-c.patch
|
||||
Patch15: 0015-Fix-a-failing-assert-in-sqlite3ResetAllSchemasOfConn.patch
|
||||
Patch16: 0016-Fix-a-parser-bug-in-the-use-of-parentheses-around-ta.patch
|
||||
Patch17: 0017-Fix-possible-integer-overflow-while-running-PRAGMA-i.patch
|
||||
Patch18: 0018-Fix-a-segfault-caused-by-using-the-RAISE-function-in.patch
|
||||
Patch19: 0019-Fix-another-problem-with-corrupt-database-handling-i.patch
|
||||
Patch20: 0020-Fix-a-buffer-overwrite-in-fts5-triggered-by-a-corrup.patch
|
||||
Patch21: 0021-Fix-another-case-in-fts5-where-a-corrupt-database-co.patch
|
||||
Patch22: 0022-Fix-another-potential-buffer-overread-in-fts5.patch
|
||||
Patch23: 0023-Fix-a-possible-memory-leak-when-trying-to-UPDATE-a-c.patch
|
||||
Patch24: 0024-Fix-an-out-of-bounds-read-in-SQL-function-fts5_decod.patch
|
||||
Patch25: 0025-Fix-a-segfault-in-fts3-prompted-by-a-corrupted-datab.patch
|
||||
Patch26: 0026-Prevent-unsigned-32-bit-integer-overflow-from-leadin.patch
|
||||
Patch27: 0027-Fix-a-problem-causing-a-crash-if-an-fts5vocab-table-.patch
|
||||
Patch28: 0028-Fix-a-harmless-memory-leak-in-the-Lemon-parser-gener.patch
|
||||
Patch29: 0029-Handle-SQL-NULL-values-without-crashing-in-the-fts5-.patch
|
||||
Patch30: 0030-Fix-a-memory-leak-that-could-occur-in-fts3-when-hand.patch
|
||||
Patch31: 0031-Fix-a-buffer-overwrite-that-could-occur-when-running.patch
|
||||
Patch32: 0032-Fix-another-corruption-related-crash-in-fts5.patch
|
||||
Patch33: 0033-Avoid-integer-overflow-when-computing-the-array-of-a.patch
|
||||
Patch34: 0034-Fix-another-segfault-caused-by-a-corrupt-fts3-databa.patch
|
||||
Patch35: 0035-Fix-a-buffer-overrun-that-could-occur-in-fts5-if-a-p.patch
|
||||
Patch36: 0036-Fix-another-fts5-crash-that-can-occur-if-the-databas.patch
|
||||
Patch37: 0037-Fix-an-assert-in-vdbemem.c-that-could-fire-if-the-da.patch
|
||||
Patch38: 0038-Fix-a-potential-problem-with-INSERT-INTO-.-SELECT-FR.patch
|
||||
Patch39: 0039-Fix-a-segfault-that-could-follow-an-OOM-when-queryin.patch
|
||||
Patch40: 0040-Fix-a-buffer-overread-in-fts3-that-could-occur-when-.patch
|
||||
Patch41: 0041-Fix-a-buffer-overrun-triggered-by-a-merge-operation-.patch
|
||||
Patch42: 0042-Fix-another-buffer-overread-in-fts5-that-may-occur-w.patch
|
||||
Patch43: 0043-Fix-another-buffer-overrun-that-could-occur-when-que.patch
|
||||
Patch44: 0044-Fix-another-segfault-that-could-occur-in-fts5-with-a.patch
|
||||
Patch45: 0045-Fix-a-potential-memory-leak-in-RBU-if-the-rbu_fossil.patch
|
||||
Patch46: 0046-Fix-a-potential-32-bit-integer-overflow-in-the-showd.patch
|
||||
Patch47: 0047-sqlite-CVE-2019-8457-out-of-bounds-read.patch
|
||||
Patch48: 0048-sqlite-CVE-2019-16168.patch
|
||||
Patch49: 0049-Fix-CVE-2019-19646.patch
|
||||
Patch50: 0050-Fix-CVE-2019-9936.patch
|
||||
Patch51: 0051-Fix-CVE-2019-9937.patch
|
||||
Patch52: 0052-Fix-CVE-2019-19923-Continue-to-back-away-from-the-LEFT-JOIN-optimizatio.patch
|
||||
Patch53: 0053-Fix-CVE-2019-19924-When-an-error-occurs-while-rewriting-the-parser-tree.patch
|
||||
Patch54: 0054-Fix-CVE-2019-19925-Fix-the-zipfile-extension-so-that-INSERT-works-even-.patch
|
||||
Patch55: 0055-Fix-CVE-2019-19926-Continuation-of-e2bddcd4c55ba3cb-Add-another-spot-wh.patch
|
||||
Patch56: 0056-Fix-CVE-2019-20218-Do-not-attempt-to-unwind-the-WITH-stack-in-the-Parse.patch
|
||||
Patch57: 0057-Fix-the-zipfile-function-in-the-zipfile-extension-so.patch
|
||||
Patch58: 0058-Fix-CVE-2018-20505.patch
|
||||
Patch59: 0059-Fix-CVE-2020-9327.patch
|
||||
Patch60: 0060-Fix-CVE-2020-11655.patch
|
||||
Patch61: 0061-Fix-CVE-2020-13434.patch
|
||||
Patch62: 0062-Fix-CVE-2020-13435.patch
|
||||
Patch63: 0063-Fix-CVE-2020-13630.patch
|
||||
Patch64: 0064-Fix-CVE-2020-13632.patch
|
||||
|
||||
BuildRequires: gcc autoconf tcl tcl-devel
|
||||
BuildRequires: ncurses-devel readline-devel glibc-devel
|
||||
@ -123,71 +122,71 @@ This contains man files and HTML files for the using of sqlite.
|
||||
%prep
|
||||
#autosetup will fail because of 2 zip files
|
||||
%setup -q -a1 -n %{name}-src-%{extver}
|
||||
%patch0000 -p1
|
||||
%patch0001 -p0
|
||||
%patch0002 -p1
|
||||
%patch6000 -p1
|
||||
%patch6001 -p1
|
||||
%patch6002 -p1
|
||||
%patch6003 -p1
|
||||
%patch6004 -p1
|
||||
%patch6005 -p1
|
||||
%patch6006 -p1
|
||||
%patch6007 -p1
|
||||
%patch6008 -p1
|
||||
%patch6009 -p1
|
||||
%patch6010 -p1
|
||||
%patch6011 -p1
|
||||
%patch6012 -p1
|
||||
%patch6013 -p1
|
||||
%patch6014 -p1
|
||||
%patch6015 -p1
|
||||
%patch6016 -p1
|
||||
%patch6017 -p1
|
||||
%patch6018 -p1
|
||||
%patch6019 -p1
|
||||
%patch6020 -p1
|
||||
%patch6021 -p1
|
||||
%patch6022 -p1
|
||||
%patch6023 -p1
|
||||
%patch6024 -p1
|
||||
%patch6025 -p1
|
||||
%patch6026 -p1
|
||||
%patch6027 -p1
|
||||
%patch6028 -p1
|
||||
%patch6029 -p1
|
||||
%patch6030 -p1
|
||||
%patch6031 -p1
|
||||
%patch6032 -p1
|
||||
%patch6033 -p1
|
||||
%patch6034 -p1
|
||||
%patch6035 -p1
|
||||
%patch6036 -p1
|
||||
%patch6037 -p1
|
||||
%patch6038 -p1
|
||||
%patch6039 -p1
|
||||
%patch6040 -p1
|
||||
%patch6041 -p1
|
||||
%patch6042 -p1
|
||||
%patch6043 -p1
|
||||
%patch6044 -p1
|
||||
%patch6045 -p1
|
||||
%patch6046 -p1
|
||||
%patch6047 -p1
|
||||
%patch6048 -p1
|
||||
%patch6049 -p1
|
||||
%patch6050 -p1
|
||||
%patch6051 -p1
|
||||
%patch6052 -p1
|
||||
%patch6053 -p1
|
||||
%patch6054 -p1
|
||||
%patch6055 -p1
|
||||
%patch6056 -p1
|
||||
%patch6057 -p1
|
||||
%patch6058 -p1
|
||||
%patch6059 -p1
|
||||
%patch6060 -p1
|
||||
%patch6061 -p1
|
||||
%patch0 -p1
|
||||
%patch1 -p0
|
||||
%patch2 -p1
|
||||
%patch3 -p1
|
||||
%patch4 -p1
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10 -p1
|
||||
%patch11 -p1
|
||||
%patch12 -p1
|
||||
%patch13 -p1
|
||||
%patch14 -p1
|
||||
%patch15 -p1
|
||||
%patch16 -p1
|
||||
%patch17 -p1
|
||||
%patch18 -p1
|
||||
%patch19 -p1
|
||||
%patch20 -p1
|
||||
%patch21 -p1
|
||||
%patch22 -p1
|
||||
%patch23 -p1
|
||||
%patch24 -p1
|
||||
%patch25 -p1
|
||||
%patch26 -p1
|
||||
%patch27 -p1
|
||||
%patch28 -p1
|
||||
%patch29 -p1
|
||||
%patch30 -p1
|
||||
%patch31 -p1
|
||||
%patch32 -p1
|
||||
%patch33 -p1
|
||||
%patch34 -p1
|
||||
%patch35 -p1
|
||||
%patch36 -p1
|
||||
%patch37 -p1
|
||||
%patch38 -p1
|
||||
%patch39 -p1
|
||||
%patch40 -p1
|
||||
%patch41 -p1
|
||||
%patch42 -p1
|
||||
%patch43 -p1
|
||||
%patch44 -p1
|
||||
%patch45 -p1
|
||||
%patch46 -p1
|
||||
%patch47 -p1
|
||||
%patch48 -p1
|
||||
%patch49 -p1
|
||||
%patch50 -p1
|
||||
%patch51 -p1
|
||||
%patch52 -p1
|
||||
%patch53 -p1
|
||||
%patch54 -p1
|
||||
%patch55 -p1
|
||||
%patch56 -p1
|
||||
%patch57 -p1
|
||||
%patch58 -p1
|
||||
%patch59 -p1
|
||||
%patch60 -p1
|
||||
%patch61 -p1
|
||||
%patch62 -p1
|
||||
%patch63 -p1
|
||||
%patch64 -p1
|
||||
|
||||
rm -f %{name}-doc-%{extver}/sqlite.css~ || :
|
||||
|
||||
@ -258,6 +257,12 @@ make test
|
||||
%{_mandir}/man*/*
|
||||
|
||||
%changelog
|
||||
* Tue Jun 30 2020 volcanodragon <linfeilong@huawei.com> - 3.24.0-12
|
||||
- Type:enhancement
|
||||
- ID:NA
|
||||
- SUG:NA
|
||||
- DESC:rename patches
|
||||
|
||||
* Tue Jun 23 2020 yanglongkang <yanglongkang@huawei.com> - 3.24.0-11
|
||||
- Type:cves
|
||||
- ID:CVE-2020-13434 CVE-2020-13435 CVE-2020-13630 CVE-2020-13632
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user