View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
January 27, 2020

RHEL 8 Still Vulnerable to “Magellan 2” SQLite Bugs, as Patches Drop

Red Hat pushes out fresh patches...

By CBR Staff Writer

Severe bugs in the ubiquitous SQLite engine – used in thousands of software applications – continue to pose a major security threat, security researchers say, with Red Hat admitting today that its flagship Red Hat Enterprise Linux (RHEL) 8 remains vulnerable, despite patching other products this week.

Red Hat said in a security update it had now inoculated RHEL 7 and its “RHEL 8.0 Update Services for SAP Solutions”, but RHEL 8 itself remains affected by one of the vulnerabilities, first disclosed to the Chromium team by China’s Tencent Blade – which dubbed them “Magellan 2.0” – in October 2019.

(Computer Business Review has contacted Red Hat’s product security team for further information and an ETA on a RHEL 8 patch. Update to follow).

SQLite vulnerabilityWhat is the SQLite Vulnerability?

The vulnerability in question, CVE-2019-13734, was reported by Tencent Blade in early December as one of a series of exploitable holes in the SQLite engine. It is described as “out of bounds write in SQLite… [that] allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.”

(SQLite is a lightweight SQL database engine and the most-used database engine in the world. It is built into the vast majority of mobile phones and most computers and comes bundled inside huge numbers of other applications.)

Tencent’s disclosure followed the 2018 discovery by the same team of the “Magellan” vulnerabilities, which affected a sweeping array of software tools that use Chromium, Webview, or which have a SQLite component.

While Tencent says it hasn’t seen exploits in the wild and Computer Business Review has yet to see a proof-of-concept of the attack* – which if weaponised would hand hackers the keys to the kingdom across a worryingly broad array of endpoints – security researchers heading upstream can find enough detail to suggest public exploits are not far off (if we have not overlooked them).

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

*Let us know if we have missed something. 

Who else is affected? Tencent Blade notes that “if you are using software that is using SQLite as component without the latest patch, which is 13 Dec 2019, and it supports external SQL queries [you are affected]. [Users of] Chrome that is prior to 79.0.3945.79 with WebSQL enabled” [are also vulnerable].

The company added: “Other devices such as PC/Mobile devices/IoT devices may also be affected, [this] depends on if there’s a proper attack surface.”

Among the Red Hat products affected by the vulnerability that it did patch today, as noted in its security advisory, were:

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux for x86_64 – Extended Update Support 7.7 x86_64
  • Red Hat Enterprise Linux Server – AUS 7.7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 7.7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, big endian – Extended Update Support 7.7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Power, little endian – Extended Update Support 7.7 ppc64le
  • Red Hat Enterprise Linux Server – TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server (for IBM Power LE) – Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux Server – Update Services for SAP Solutions 7.7 x86_64

See also: Red Hat Warns Over Critical “Envoy” Vulnerability: Users Include a Who’s Who of Big Tech

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU