Blame SOURCES/sqlite-3.26.0-CVE-2019-20218.patch

cea1fa
From 8fd3688e01f5839120d7477ca94e013f5809edcf Mon Sep 17 00:00:00 2001
cea1fa
From: Ondrej Dubaj <odubaj@redhat.com>
cea1fa
Date: Tue, 24 Mar 2020 11:33:04 +0100
cea1fa
Subject: [PATCH] Do not attempt to unwind the WITH stack in the Parse object
cea1fa
 following an error.
cea1fa
cea1fa
---
cea1fa
 src/select.c | 2 +-
cea1fa
 1 file changed, 1 insertion(+), 1 deletion(-)
cea1fa
cea1fa
diff --git a/src/select.c b/src/select.c
cea1fa
index 0205a08..bbd13a4 100644
cea1fa
--- a/src/select.c
cea1fa
+++ b/src/select.c
cea1fa
@@ -4910,7 +4910,7 @@ static int selectExpander(Walker *pWalker, Select *p){
cea1fa
 
cea1fa
   /* Process NATURAL keywords, and ON and USING clauses of joins.
cea1fa
   */
cea1fa
-  if( db->mallocFailed || sqliteProcessJoin(pParse, p) ){
cea1fa
+  if( pParse->nErr || db->mallocFailed || sqliteProcessJoin(pParse, p) ){
cea1fa
     return WRC_Abort;
cea1fa
   }
cea1fa
 
cea1fa
-- 
cea1fa
2.24.1
cea1fa