Blame SOURCES/sqlite-3.26.0-CVE-2022-35737.patch

8ad3a9
From 077e17b59a98eb8839ecfef661e7305fdb3e898d Mon Sep 17 00:00:00 2001
8ad3a9
From: drh <>
8ad3a9
Date: Mon, 18 Jul 2022 15:02:00 +0000
8ad3a9
Subject: [PATCH] Increase the size of loop variables in the printf()
8ad3a9
 implementation to avoid harmless compiler warnings.
8ad3a9
8ad3a9
FossilOrigin-Name: aab790a16e1bdff78759f9c9ae87a2559ba82dd34ef3dedfb66035a0db7067a7
8ad3a9
---
8ad3a9
 manifest      | 12 ++++++------
8ad3a9
 manifest.uuid |  2 +-
8ad3a9
 src/printf.c  |  4 ++--
8ad3a9
 1 files changed, 2 insertions(+), 2 deletions(-)
8ad3a9
8ad3a9
diff --git a/src/printf.c b/src/printf.c
8ad3a9
index f0bfa5327..3602e1fcb 100644
8ad3a9
--- a/src/printf.c
8ad3a9
+++ b/src/printf.c
8ad3a9
@@ -803,8 +803,8 @@ void sqlite3_str_vappendf(
8ad3a9
       case etSQLESCAPE:           /* %q: Escape ' characters */
8ad3a9
       case etSQLESCAPE2:          /* %Q: Escape ' and enclose in '...' */
8ad3a9
       case etSQLESCAPE3: {        /* %w: Escape " characters */
8ad3a9
-        int i, j, k, n, isnull;
8ad3a9
-        int needQuote;
8ad3a9
+        i64 i, j, k, n;
8ad3a9
+        int needQuote, isnull;
8ad3a9
         char ch;
8ad3a9
         char q = ((xtype==etSQLESCAPE3)?'"':'\'');   /* Quote character */
8ad3a9
         char *escarg;
8ad3a9
--
8ad3a9
2.38.1
8ad3a9