On 8/27/19, Jens Alfke <j...@mooseyard.com> wrote:
> is [SQLite] engineered with the
> assumption that a database file may be malicious, or is the assumption
> "garbage in, garbage out"?

https://www.sqlite.org/security.html
https://www.sqlite.org/testing.html

Our intent is that SQLite database files are secure in the sense that
reading a maliciously corrupted database file is harmless.  I spend
most of my time testing for this sort of thing, and dreaming up new
defenses against yet undiscovered attacks.

Research out of the University of Buffalo shows that every Android
phone has about 200 SQLite database files and about 14% of those are
used for transfer purposes only.  In other words, content is
downloaded from the cloud as an SQLite database then becomes read-only
on the phone.  That's about 70 billion databases used as containers.
So lots of people are using SQLite as a container.  And those numbers
are for Android only.  Indications are the iOS is even bigger.

We work very hard to ensure that those billions and billions of data
containers in circulation are not a security risk.

That said, Jens remarks made me realize that the SQLite archive code
has not been updated recently to implement the best practices outlined
in the first document above.  The existing code is safe.  But I'll get
busy and add the extra layers of defense to make it even safer.
-- 
D. Richard Hipp
d...@sqlite.org
_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to