From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ricardo Wurmus Subject: bug#33751: SQLite "Magellan" vulnerability Date: Sat, 15 Dec 2018 11:47:07 +0100 Message-ID: <87woobvzh0.fsf@elephly.net> References: <87r2ejve09.fsf@fastmail.com> <87o99nv9pa.fsf@fastmail.com> Mime-Version: 1.0 Content-Type: text/plain Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:49075) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1gY7UM-0005jC-72 for bug-guix@gnu.org; Sat, 15 Dec 2018 05:48:07 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1gY7UI-0001qe-7F for bug-guix@gnu.org; Sat, 15 Dec 2018 05:48:06 -0500 Received: from debbugs.gnu.org ([208.118.235.43]:44730) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1gY7UI-0001qa-3K for bug-guix@gnu.org; Sat, 15 Dec 2018 05:48:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1gY7UI-0007GN-0V for bug-guix@gnu.org; Sat, 15 Dec 2018 05:48:02 -0500 Sender: "Debbugs-submit" Resent-Message-ID: In-reply-to: <87o99nv9pa.fsf@fastmail.com> List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+gcggb-bug-guix=m.gmane.org@gnu.org Sender: "bug-Guix" To: Marius Bakke Cc: 33751@debbugs.gnu.org Marius Bakke writes: > Marius Bakke writes: > >> Hello! >> >> There is allegedly a remote code execution bug in all versions of SQLite >> prior to 3.26.0: . >> >> I think it is safe to graft 3.26.0 in-place: >> >> $ abidiff /gnu/store/pba3xzrkq2k4wgh3arif4xpkblr5qz2n-sqlite-3.24.0/lib/libsqlite3.so /gnu/store/r0krlfg010d9zj935gxx0p24pcs0kv9s-sqlite-3.26.0/lib/libsqlite3.so >> Functions changes summary: 0 Removed, 0 Changed, 0 Added function >> Variables changes summary: 0 Removed, 0 Changed, 0 Added variable >> Function symbols changes summary: 0 Removed, 1 Added function symbol not referenced by debug info >> Variable symbols changes summary: 0 Removed, 0 Added variable symbol not referenced by debug info >> >> 1 Added function symbol not referenced by debug info: >> >> sqlite3_create_window_function >> >> ...but I have not tested this. It's difficult to tell which patches to >> apply without knowing more details of the vulnerability. >> >> I am currently building a branch that adds a "static" output for >> SQLite in order to catch users of libsqlite3.a. Can we start this on >> Berlin concurrently? Patches attached. > > Perhaps it's better to start over 'staging' with the new SQLite in the > mean time? Hydra didn't get too far yet. > > It does not add a lot to the current rebuild count. Sounds good to me. Thank you! -- Ricardo