GNU bug report logs

#33751 SQLite "Magellan" vulnerability

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Full log

Message #11 received at 33751@debbugs.gnu.org (full text, mbox, reply):

Received: (at 33751) by debbugs.gnu.org; 15 Dec 2018 10:47:19 +0000
From debbugs-submit-bounces@debbugs.gnu.org Sat Dec 15 05:47:19 2018
Received: from localhost ([127.0.0.1]:48988 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces@debbugs.gnu.org>)
	id 1gY7Ta-0007FI-U7
	for submit@debbugs.gnu.org; Sat, 15 Dec 2018 05:47:19 -0500
Received: from sender-of-o53.zoho.com ([135.84.80.218]:21821)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <rekado@elephly.net>) id 1gY7TY-0007F7-Nx
 for 33751@debbugs.gnu.org; Sat, 15 Dec 2018 05:47:17 -0500
ARC-Seal: i=1; a=rsa-sha256; t=1544870832; cv=none; d=zoho.com; s=zohoarc; 
 b=dgxBvqSvceYy//u2E8vNyZS8tBWtsYkiAwgALJ4JAd7rZZof43rqIm6/LX/iyMzCGLEebfrjd4SZ6uxRhj/P5hi+qQ7qXGpGlkR3Wo7EmsPltrdSKNVyJ9m/0nFO0frYrVJUmNLxjegOqxw6FDM67bYbgkBpk6kgT+wPvbBZiMQ=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com;
 s=zohoarc; t=1544870832;
 h=Content-Type:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To:ARC-Authentication-Results;
 bh=ZBZILcxa6k/yoJYUcipXlgg9PK90rtHMlSkHy9aB5sU=; 
 b=LGtdbwGnwpEC3tlf2SCpyvthKTYLbRbmPuheoJMonZ0aBA0zL99ALXkdYFICNfG5YZyWgwGnAw7a5GCadiCgH9QtZ/6xUoxh+ha9BOebVQoKZH0ZqmlU0nKemrhpoBjJb87w0WKvDa82uTu5Htxt/5H5R6Td4KMdn1xG2nFjZsk=
ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass  header.i=elephly.net;
 spf=pass  smtp.mailfrom=rekado@elephly.net;
 dmarc=pass header.from=<rekado@elephly.net> header.from=<rekado@elephly.net>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1544870832; 
 s=zoho; d=elephly.net; i=rekado@elephly.net;
 h=References:From:To:Cc:Subject:In-reply-to:Date:Message-ID:MIME-Version:Content-Type;
 l=1486; bh=ZBZILcxa6k/yoJYUcipXlgg9PK90rtHMlSkHy9aB5sU=;
 b=cRB0GjHe/37YUxfBW/H/+Bu5NuGj9VJ0gp5hRdFP+4ETqIlxHNqhh59QNFvnOYb+
 JvtzzkOy6o6btjeD5Yy3cZynP2yI+uHA2VrQYYS2sEU6DZiNcJ+4GeFBKejVUYFxcAw
 vEJvJFmjeMhAs86Dpvf+/Wo02Ql7O8LpTe2QDEoo=
Received: from localhost (p578E63FB.dip0.t-ipconnect.de [87.142.99.251]) by
 mx.zohomail.com with SMTPS id 1544870830876322.9326690223269;
 Sat, 15 Dec 2018 02:47:10 -0800 (PST)
References: <87r2ejve09.fsf@fastmail.com> <87o99nv9pa.fsf@fastmail.com>
User-agent: mu4e 1.0; emacs 26.1
From: Ricardo Wurmus <rekado@elephly.net>
To: Marius Bakke <mbakke@fastmail.com>
Subject: Re: bug#33751: SQLite "Magellan" vulnerability
In-reply-to: <87o99nv9pa.fsf@fastmail.com>
X-URL: https://elephly.net
X-PGP-Key: https://elephly.net/rekado.pubkey
X-PGP-Fingerprint: BCA6 89B6 3655 3801 C3C6  2150 197A 5888 235F ACAC
Date: Sat, 15 Dec 2018 11:47:07 +0100
Message-ID: <87woobvzh0.fsf@elephly.net>
MIME-Version: 1.0
Content-Type: text/plain
X-ZohoMailClient: External
X-Spam-Score: -0.0 (/)
X-Debbugs-Envelope-To: 33751
Cc: 33751@debbugs.gnu.org
X-BeenThere: debbugs-submit@debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit@debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request@debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request@debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces@debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces@debbugs.gnu.org>
X-Spam-Score: -1.0 (-)
Marius Bakke <mbakke@fastmail.com> writes:

> Marius Bakke <mbakke@fastmail.com> writes:
>
>> Hello!
>>
>> There is allegedly a remote code execution bug in all versions of SQLite
>> prior to 3.26.0: <https://blade.tencent.com/magellan/index_en.html>.
>>
>> I think it is safe to graft 3.26.0 in-place:
>>
>> $ abidiff /gnu/store/pba3xzrkq2k4wgh3arif4xpkblr5qz2n-sqlite-3.24.0/lib/libsqlite3.so /gnu/store/r0krlfg010d9zj935gxx0p24pcs0kv9s-sqlite-3.26.0/lib/libsqlite3.so
>>   Functions changes summary: 0 Removed, 0 Changed, 0 Added function                                 
>>   Variables changes summary: 0 Removed, 0 Changed, 0 Added variable                                 
>>   Function symbols changes summary: 0 Removed, 1 Added function symbol not referenced by debug info 
>>   Variable symbols changes summary: 0 Removed, 0 Added variable symbol not referenced by debug info 
>>
>>   1 Added function symbol not referenced by debug info:                                             
>>
>>     sqlite3_create_window_function
>>
>> ...but I have not tested this.  It's difficult to tell which patches to
>> apply without knowing more details of the vulnerability.
>>
>> I am currently building a branch that adds a "static" output for
>> SQLite in order to catch users of libsqlite3.a.  Can we start this on
>> Berlin concurrently?  Patches attached.
>
> Perhaps it's better to start over 'staging' with the new SQLite in the
> mean time?  Hydra didn't get too far yet.
>
> It does not add a lot to the current rebuild count.

Sounds good to me.  Thank you!

-- 
Ricardo





Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sun Dec 22 11:15:54 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.