Package: sqlite3 / 3.40.1-2+deb12u1

Metadata

Package Version Patches format
sqlite3 3.40.1-2+deb12u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
10 520466 libsqlite3 depends on libdl.patch | (download)

configure.ac | 32 32 + 0 - 0 !
1 file changed, 32 insertions(+)

---
10 520478 squash bad deps.patch | (download)

Makefile.in | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

---
20 hurd locking style.patch | (download)

src/os_unix.c | 10 6 + 4 - 0 !
1 file changed, 6 insertions(+), 4 deletions(-)

---
30 cross.patch | (download)

Makefile.in | 25 19 + 6 - 0 !
1 file changed, 19 insertions(+), 6 deletions(-)

---
10 665363 disable malloc usable size.patch | (download)

configure.ac | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 disable malloc_usable_size
 Disable code introduced in sqlite 3.7.10 using malloc_usable_size, as it caused
 a regression on 64-bit platforms.
31 increase_SQLITE_MAX_DEFAULT_PAGE_SIZE_to_32k.patch | (download)

src/sqliteLimit.h | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 increase the maximum possible value of the page size
 Firefox/Iceweasel uses a page size of 32k, but sqlite won't allow it
 because the maximum it allows by default is 8k (through the
 SQLITE_MAX_DEFAULT_PAGE_SIZE define). This patch increases this limit.
 .
32 dynamic_link.patch | (download)

Makefile.in | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

---
02 use packaged lempar.c.patch | (download)

tool/lemon.c | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

 use packaged lempar.c
 Look for lempar.c under the package directory.
40 amalgamation_configure.patch | (download)

configure.ac | 21 21 + 0 - 0 !
1 file changed, 21 insertions(+)

---
0001 Fix a buffer overread in the sessions extension that.patch | (download)

ext/session/sqlite3session.c | 18 11 + 7 - 0 !
1 file changed, 11 insertions(+), 7 deletions(-)

 fix a buffer overread in the sessions extension that could occur when
 processing a corrupt changeset.

FossilOrigin-Name: 0e4e7a05c4204b47a324d67e18e76d2a98e26b2723d19d5c655ec9fd2e41f4b7

0002 Avoid a stack overflow that could be caused by a rec.patch | (download)

src/resolve.c | 2 1 + 1 - 0 !
test/windowE.test | 20 20 + 0 - 0 !
2 files changed, 21 insertions(+), 1 deletion(-)

 avoid a stack overflow that could be caused by a recursively defined
 WINDOW() with a strategically embedded error.

FossilOrigin-Name: bada54bd6bf54190e40aa721b77081015957d204c7b6a9fdbe8c67bcf20798f8

0003 Fix a technically undefined signed integer overflow .patch | (download)

ext/fts5/fts5_index.c | 2 1 + 1 - 0 !
ext/fts5/test/fts5integrity2.test | 56 56 + 0 - 0 !
2 files changed, 57 insertions(+), 1 deletion(-)

 fix a technically undefined signed integer overflow in fts5.

FossilOrigin-Name: e6bec37ea1ca51e1d048941ce4c5211d8fc5c5e3556a1441f9c79b036843f9e3