From patchwork Wed Jan 31 14:18:48 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7528 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4TQ40V0t9Hz3wkH for ; Wed, 31 Jan 2024 14:19:06 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4TQ40T4cGVz2q3; Wed, 31 Jan 2024 14:19:05 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4TQ40T47jfz32lX; Wed, 31 Jan 2024 14:19:05 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4TQ40H5cwNz32lV for ; Wed, 31 Jan 2024 14:18:55 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4TQ40H48qpz1l2; Wed, 31 Jan 2024 14:18:55 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1706710735; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Wm6qpLcoI6T3tHQpS2R9YeelgTCEXS+7GcG99McZh0U=; b=tWkCTgMMAaWBm6nEKeZ1h24xGeGdw+J/GxeWR8c/O4uYm5TXDGIDQwozgGCRCDw9PSa02R 4MBtq6VcD98HBYBg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1706710735; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Wm6qpLcoI6T3tHQpS2R9YeelgTCEXS+7GcG99McZh0U=; b=aJDGCAzX4OBmPQ76Igf9h5Asat7sUYUblkwvQvW05GWkDVeiQOU/RYtqlbBtCatsyQ9/xS pfIvPcxJpHV12KJrpkztPBRaZanN/XeTLrwe1X5xQZhZsxLZO9xnkeOAtcE8bcEZNbETR7 iCmJ8MNr2qZIMnWZVlewgsCo6+VJJZLrGp3xBijt/WjwQNW315ntuSANVeQwuQZFqS6NDb EU5NX2BizIOQqUJ/7nPCc0Vo19FcvXZM2uMT0PNZ1w/KsimXtcc0ic+Y7QYKk72sXs2AbH bUFitUuTkGAKd4D9/sZ1yVkw2Hf+QlSjIO7+MloJ82cOGjW0Or1YJg9fpZcBuQ== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] sqlite: Update to version 3450100 Date: Wed, 31 Jan 2024 15:18:48 +0100 Message-ID: <20240131141848.3280362-5-adolf.belka@ipfire.org> In-Reply-To: <20240131141848.3280362-1-adolf.belka@ipfire.org> References: <20240131141848.3280362-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: YVCRC43CPNLLOUED5MPCCNXKXBZTXKH4 X-Message-ID-Hash: YVCRC43CPNLLOUED5MPCCNXKXBZTXKH4 X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 3450000 to 3450100 - Update of rootfile not required - Changelog 3.45.1 Restore the JSON BLOB input bug, and promise to support the anomaly in subsequent releases, for backward compatibility. Fix the PRAGMA integrity_check command so that it works on read-only databases that contain FTS3 and FTS5 tables. This resolves an issue introduced in version 3.44.0 but was undiscovered until after the 3.45.0 release. Fix issues associated with processing corrupt JSONB inputs: Prevent exponential runtime when converting a corrupt JSONB into text. Fix a possible read of one byte past the end of the JSONB blob when converting a corrupt JSONB into text. Enhanced testing using jfuzz to prevent any future JSONB problems such as the above. Fix a long-standing bug in which a read of a few bytes past the end of a memory-mapped segment might occur when accessing a craftily corrupted database using memory-mapped database. Fix a long-standing bug in which a NULL pointer dereference might occur in the bytecode engine due to incorrect bytecode being generated for a class of SQL statements that are deliberately designed to stress the query planner but which are otherwise pointless. Signed-off-by: Adolf Belka --- lfs/sqlite | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lfs/sqlite b/lfs/sqlite index 3ca4e45ff..0ad87a082 100644 --- a/lfs/sqlite +++ b/lfs/sqlite @@ -24,7 +24,7 @@ include Config -VER = 3450000 +VER = 3450100 THISAPP = sqlite-autoconf-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 04ba8522be5fa8c0a0a101824f90030f83ad131b53dff622e0449d31b3ee3e50888ed0d8a663c5be3f7338d5d5b6efef1b828374fa599a675ab892bbbb3abec9 +$(DL_FILE)_BLAKE2 = 2725faccde5b964b3c037ae0f885b3461c01619e6c086e53f53cc1ecf7e75a46dd1ac4bec4803bc149014d158976607d195993e5d925b723284512a880010bf5 install : $(TARGET)