Hi Salvatore,

On Tue, Jun 11, 2019 at 6:18 AM Salvatore Bonaccorso <car...@debian.org> wrote:
> On Mon, Jun 10, 2019 at 05:06:07PM +0000, Debian Bug Tracking System wrote:
> >  sqlite3 (3.27.2-3) unstable; urgency=high
> >  .
> >    * Backport security related patches:
> [...]
> >      - prevent aliases of window functions expressions from being used as
> >        arguments to aggregate or other window functions (probably fixing
> >        CVE-2019-5018) (closes: #928770),
>
> Did you got any upstream confirmation or from TALOS project that this
> one was the right fixes to pick for the CVE-2019-5018 issue?
 I can't find a contact method for TALOS project. Upstream says they
don't know what's CVE-2019-5018 but I can assemble the PoC from the
TALOS report page. As they know / read the issue it is fixed in
sqlite3 3.28.0 and I should use that - being tested in every sense by
their closed source detailed test cases.
But upstream says that the commit (I've used for the package) is a
good to have fix for window functions.
Then it was asked publicly again and all that upstream say about which
version / commit fixes this: "it appears to be 3.28.0, as best as I
can tell"[1]. Anyone can interpret this as s/he would like. :-/

Regards,
Laszlo/GCS
[1] 
https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg115515.html

Reply via email to