opensuse-su-2021:1058-1
Vulnerability from csaf_opensuse
Published
2021-07-19 21:03
Modified
2021-07-19 21:03
Summary
Security update for sqlite3
Notes
Title of the patch
Security update for sqlite3
Description of the patch
This update for sqlite3 fixes the following issues:
- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
(bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2021-1058
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sqlite3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sqlite3 fixes the following issues:\n\n- Update to version 3.36.0\n- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener\n optimization (bsc#1173641)\n- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in\n isAuxiliaryVtabOperator (bsc#1164719)\n- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)\n- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded \u0027\\0\u0027 input (bsc#1160438)\n- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer\n dereference (bsc#1160309)\n- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)\n- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)\n- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)\n- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference\n (bsc#1159491)\n- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with\n a shadow table name (bsc#1158960)\n- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated\n columns (bsc#1158959)\n- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views\n in conjunction with ALTER TABLE statements (bsc#1158958)\n- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,\n which allows attackers to cause a denial of service (bsc#1158812)\n- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a\n sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)\n- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)\n- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)\n- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)\n- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow\n- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)\n- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)\n- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1058",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1058-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1058-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1058-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1157818",
"url": "https://bugzilla.suse.com/1157818"
},
{
"category": "self",
"summary": "SUSE Bug 1158812",
"url": "https://bugzilla.suse.com/1158812"
},
{
"category": "self",
"summary": "SUSE Bug 1158958",
"url": "https://bugzilla.suse.com/1158958"
},
{
"category": "self",
"summary": "SUSE Bug 1158959",
"url": "https://bugzilla.suse.com/1158959"
},
{
"category": "self",
"summary": "SUSE Bug 1158960",
"url": "https://bugzilla.suse.com/1158960"
},
{
"category": "self",
"summary": "SUSE Bug 1159491",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "self",
"summary": "SUSE Bug 1159715",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "self",
"summary": "SUSE Bug 1159847",
"url": "https://bugzilla.suse.com/1159847"
},
{
"category": "self",
"summary": "SUSE Bug 1159850",
"url": "https://bugzilla.suse.com/1159850"
},
{
"category": "self",
"summary": "SUSE Bug 1160309",
"url": "https://bugzilla.suse.com/1160309"
},
{
"category": "self",
"summary": "SUSE Bug 1160438",
"url": "https://bugzilla.suse.com/1160438"
},
{
"category": "self",
"summary": "SUSE Bug 1160439",
"url": "https://bugzilla.suse.com/1160439"
},
{
"category": "self",
"summary": "SUSE Bug 1164719",
"url": "https://bugzilla.suse.com/1164719"
},
{
"category": "self",
"summary": "SUSE Bug 1172091",
"url": "https://bugzilla.suse.com/1172091"
},
{
"category": "self",
"summary": "SUSE Bug 1172115",
"url": "https://bugzilla.suse.com/1172115"
},
{
"category": "self",
"summary": "SUSE Bug 1172234",
"url": "https://bugzilla.suse.com/1172234"
},
{
"category": "self",
"summary": "SUSE Bug 1172236",
"url": "https://bugzilla.suse.com/1172236"
},
{
"category": "self",
"summary": "SUSE Bug 1172240",
"url": "https://bugzilla.suse.com/1172240"
},
{
"category": "self",
"summary": "SUSE Bug 1173641",
"url": "https://bugzilla.suse.com/1173641"
},
{
"category": "self",
"summary": "SUSE Bug 928700",
"url": "https://bugzilla.suse.com/928700"
},
{
"category": "self",
"summary": "SUSE Bug 928701",
"url": "https://bugzilla.suse.com/928701"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3414 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3415 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19244 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19317 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19603 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19645 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19646 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19880 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19923 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19924 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19925 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19959 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13434 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13435 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13630 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13631 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13632 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15358 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-9327 page",
"url": "https://www.suse.com/security/cve/CVE-2020-9327/"
}
],
"title": "Security update for sqlite3",
"tracking": {
"current_release_date": "2021-07-19T21:03:43Z",
"generator": {
"date": "2021-07-19T21:03:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1058-1",
"initial_release_date": "2021-07-19T21:03:43Z",
"revision_history": [
{
"date": "2021-07-19T21:03:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"product": {
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"product_id": "libsqlite3-0-3.36.0-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-3.36.0-lp152.4.3.1.i586",
"product": {
"name": "sqlite3-3.36.0-lp152.4.3.1.i586",
"product_id": "sqlite3-3.36.0-lp152.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"product": {
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"product_id": "sqlite3-devel-3.36.0-lp152.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "sqlite3-doc-3.36.0-lp152.4.3.1.noarch",
"product": {
"name": "sqlite3-doc-3.36.0-lp152.4.3.1.noarch",
"product_id": "sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"product": {
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"product_id": "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"product": {
"name": "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"product_id": "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.36.0-lp152.4.3.1.x86_64",
"product": {
"name": "sqlite3-3.36.0-lp152.4.3.1.x86_64",
"product_id": "sqlite3-3.36.0-lp152.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"product": {
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"product_id": "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586"
},
"product_reference": "libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64"
},
"product_reference": "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64"
},
"product_reference": "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586"
},
"product_reference": "sqlite3-3.36.0-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64"
},
"product_reference": "sqlite3-3.36.0-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586"
},
"product_reference": "sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64"
},
"product_reference": "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.36.0-lp152.4.3.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
},
"product_reference": "sqlite3-doc-3.36.0-lp152.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-3414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3414"
}
],
"notes": [
{
"category": "general",
"text": "SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3414",
"url": "https://www.suse.com/security/cve/CVE-2015-3414"
},
{
"category": "external",
"summary": "SUSE Bug 1085790 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/1085790"
},
{
"category": "external",
"summary": "SUSE Bug 1190372 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/1190372"
},
{
"category": "external",
"summary": "SUSE Bug 1193078 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/1193078"
},
{
"category": "external",
"summary": "SUSE Bug 928700 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/928700"
},
{
"category": "external",
"summary": "SUSE Bug 928701 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/928701"
},
{
"category": "external",
"summary": "SUSE Bug 928702 for CVE-2015-3414",
"url": "https://bugzilla.suse.com/928702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2015-3414"
},
{
"cve": "CVE-2015-3415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3415"
}
],
"notes": [
{
"category": "general",
"text": "The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0\u0026O\u003eO) in a CREATE TABLE statement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3415",
"url": "https://www.suse.com/security/cve/CVE-2015-3415"
},
{
"category": "external",
"summary": "SUSE Bug 1190372 for CVE-2015-3415",
"url": "https://bugzilla.suse.com/1190372"
},
{
"category": "external",
"summary": "SUSE Bug 928700 for CVE-2015-3415",
"url": "https://bugzilla.suse.com/928700"
},
{
"category": "external",
"summary": "SUSE Bug 928701 for CVE-2015-3415",
"url": "https://bugzilla.suse.com/928701"
},
{
"category": "external",
"summary": "SUSE Bug 928702 for CVE-2015-3415",
"url": "https://bugzilla.suse.com/928702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2015-3415"
},
{
"cve": "CVE-2019-19244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19244"
}
],
"notes": [
{
"category": "general",
"text": "sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19244",
"url": "https://www.suse.com/security/cve/CVE-2019-19244"
},
{
"category": "external",
"summary": "SUSE Bug 1157817 for CVE-2019-19244",
"url": "https://bugzilla.suse.com/1157817"
},
{
"category": "external",
"summary": "SUSE Bug 1157818 for CVE-2019-19244",
"url": "https://bugzilla.suse.com/1157818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19244"
},
{
"cve": "CVE-2019-19317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19317"
}
],
"notes": [
{
"category": "general",
"text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19317",
"url": "https://www.suse.com/security/cve/CVE-2019-19317"
},
{
"category": "external",
"summary": "SUSE Bug 1158812 for CVE-2019-19317",
"url": "https://bugzilla.suse.com/1158812"
},
{
"category": "external",
"summary": "SUSE Bug 1196773 for CVE-2019-19317",
"url": "https://bugzilla.suse.com/1196773"
},
{
"category": "external",
"summary": "SUSE Bug 1196775 for CVE-2019-19317",
"url": "https://bugzilla.suse.com/1196775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19317"
},
{
"cve": "CVE-2019-19603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19603"
}
],
"notes": [
{
"category": "general",
"text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19603",
"url": "https://www.suse.com/security/cve/CVE-2019-19603"
},
{
"category": "external",
"summary": "SUSE Bug 1158960 for CVE-2019-19603",
"url": "https://bugzilla.suse.com/1158960"
},
{
"category": "external",
"summary": "SUSE Bug 1193078 for CVE-2019-19603",
"url": "https://bugzilla.suse.com/1193078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "important"
}
],
"title": "CVE-2019-19603"
},
{
"cve": "CVE-2019-19645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19645"
}
],
"notes": [
{
"category": "general",
"text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19645",
"url": "https://www.suse.com/security/cve/CVE-2019-19645"
},
{
"category": "external",
"summary": "SUSE Bug 1158958 for CVE-2019-19645",
"url": "https://bugzilla.suse.com/1158958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19645"
},
{
"cve": "CVE-2019-19646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19646"
}
],
"notes": [
{
"category": "general",
"text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19646",
"url": "https://www.suse.com/security/cve/CVE-2019-19646"
},
{
"category": "external",
"summary": "SUSE Bug 1158959 for CVE-2019-19646",
"url": "https://bugzilla.suse.com/1158959"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19646"
},
{
"cve": "CVE-2019-19880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19880"
}
],
"notes": [
{
"category": "general",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19880",
"url": "https://www.suse.com/security/cve/CVE-2019-19880"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "important"
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19923"
}
],
"notes": [
{
"category": "general",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19923",
"url": "https://www.suse.com/security/cve/CVE-2019-19923"
},
{
"category": "external",
"summary": "SUSE Bug 1160309 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1160309"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19924"
}
],
"notes": [
{
"category": "general",
"text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19924",
"url": "https://www.suse.com/security/cve/CVE-2019-19924"
},
{
"category": "external",
"summary": "SUSE Bug 1159850 for CVE-2019-19924",
"url": "https://bugzilla.suse.com/1159850"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19924"
},
{
"cve": "CVE-2019-19925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19925"
}
],
"notes": [
{
"category": "general",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19925",
"url": "https://www.suse.com/security/cve/CVE-2019-19925"
},
{
"category": "external",
"summary": "SUSE Bug 1159847 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1159847"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "low"
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19926"
}
],
"notes": [
{
"category": "general",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19926",
"url": "https://www.suse.com/security/cve/CVE-2019-19926"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "important"
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2019-19959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19959"
}
],
"notes": [
{
"category": "general",
"text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19959",
"url": "https://www.suse.com/security/cve/CVE-2019-19959"
},
{
"category": "external",
"summary": "SUSE Bug 1160438 for CVE-2019-19959",
"url": "https://bugzilla.suse.com/1160438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19959"
},
{
"cve": "CVE-2019-20218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20218"
}
],
"notes": [
{
"category": "general",
"text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20218",
"url": "https://www.suse.com/security/cve/CVE-2019-20218"
},
{
"category": "external",
"summary": "SUSE Bug 1160439 for CVE-2019-20218",
"url": "https://bugzilla.suse.com/1160439"
},
{
"category": "external",
"summary": "SUSE Bug 1189840 for CVE-2019-20218",
"url": "https://bugzilla.suse.com/1189840"
},
{
"category": "external",
"summary": "SUSE Bug 1190372 for CVE-2019-20218",
"url": "https://bugzilla.suse.com/1190372"
},
{
"category": "external",
"summary": "SUSE Bug 1192495 for CVE-2019-20218",
"url": "https://bugzilla.suse.com/1192495"
},
{
"category": "external",
"summary": "SUSE Bug 1193078 for CVE-2019-20218",
"url": "https://bugzilla.suse.com/1193078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "important"
}
],
"title": "CVE-2019-20218"
},
{
"cve": "CVE-2020-13434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13434"
}
],
"notes": [
{
"category": "general",
"text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13434",
"url": "https://www.suse.com/security/cve/CVE-2020-13434"
},
{
"category": "external",
"summary": "SUSE Bug 1172115 for CVE-2020-13434",
"url": "https://bugzilla.suse.com/1172115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-13434"
},
{
"cve": "CVE-2020-13435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13435"
}
],
"notes": [
{
"category": "general",
"text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13435",
"url": "https://www.suse.com/security/cve/CVE-2020-13435"
},
{
"category": "external",
"summary": "SUSE Bug 1172091 for CVE-2020-13435",
"url": "https://bugzilla.suse.com/1172091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "important"
}
],
"title": "CVE-2020-13435"
},
{
"cve": "CVE-2020-13630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13630"
}
],
"notes": [
{
"category": "general",
"text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13630",
"url": "https://www.suse.com/security/cve/CVE-2020-13630"
},
{
"category": "external",
"summary": "SUSE Bug 1172234 for CVE-2020-13630",
"url": "https://bugzilla.suse.com/1172234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-13630"
},
{
"cve": "CVE-2020-13631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13631"
}
],
"notes": [
{
"category": "general",
"text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13631",
"url": "https://www.suse.com/security/cve/CVE-2020-13631"
},
{
"category": "external",
"summary": "SUSE Bug 1172236 for CVE-2020-13631",
"url": "https://bugzilla.suse.com/1172236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-13631"
},
{
"cve": "CVE-2020-13632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13632"
}
],
"notes": [
{
"category": "general",
"text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13632",
"url": "https://www.suse.com/security/cve/CVE-2020-13632"
},
{
"category": "external",
"summary": "SUSE Bug 1172240 for CVE-2020-13632",
"url": "https://bugzilla.suse.com/1172240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-13632"
},
{
"cve": "CVE-2020-15358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15358"
}
],
"notes": [
{
"category": "general",
"text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15358",
"url": "https://www.suse.com/security/cve/CVE-2020-15358"
},
{
"category": "external",
"summary": "SUSE Bug 1173641 for CVE-2020-15358",
"url": "https://bugzilla.suse.com/1173641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-9327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-9327"
}
],
"notes": [
{
"category": "general",
"text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-9327",
"url": "https://www.suse.com/security/cve/CVE-2020-9327"
},
{
"category": "external",
"summary": "SUSE Bug 1164719 for CVE-2020-9327",
"url": "https://bugzilla.suse.com/1164719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586",
"openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64",
"openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-19T21:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2020-9327"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…