sqlite-3.26.0-11.el8

エラータID: AXSA:2020-1005:03

Release date: 
Sunday, December 20, 2020 - 02:47
Subject: 
sqlite-3.26.0-11.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

Security Fix(es):

* sqlite: Use-after-free in window function leading to remote code execution (CVE-2019-5018)

* sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c (CVE-2019-16168)

* sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (CVE-2019-20218)

* sqlite: Out-of-bounds read in SELECT with ON/USING clause (CVE-2020-6405)

* sqlite: NULL pointer dereference and segmentation fault because of generated column optimizations (CVE-2020-9327)

* sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c (CVE-2020-13630)

* sqlite: Virtual table can be renamed into the name of one of its shadow tables (CVE-2020-13631)

* sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query (CVE-2020-13632)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2019-16168
In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
CVE-2019-20218
selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
CVE-2019-5018
An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
CVE-2020-13630
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
CVE-2020-13631
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
CVE-2020-13632
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
CVE-2020-6405
Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
CVE-2020-9327
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. sqlite-3.26.0-11.el8.src.rpm
    MD5: 55446adf2ebdceee01f0b170c6fbe6eb
    SHA-256: 30809f48e10216064f3bc19e8dd3eb84d88297bfb298537d2a7002987b4d777e
    Size: 22.48 MB

Asianux Server 8 for x86_64
  1. lemon-3.26.0-11.el8.x86_64.rpm
    MD5: 72e19359818e615067a0fe10ff5c6777
    SHA-256: f3cc3c717f6884be8149451c4cc17edbdd0d771f6f2d617e31c553b7f277e4f1
    Size: 75.40 kB
  2. sqlite-3.26.0-11.el8.x86_64.rpm
    MD5: 87c853953cb4cdfb73d2f7d961ab687b
    SHA-256: 7f944b7f60b06cad9951300ff9858e60511adc11f2822e442120e664e3a1e5d5
    Size: 665.85 kB
  3. sqlite-devel-3.26.0-11.el8.x86_64.rpm
    MD5: 233c11956457b28050f3059a88421fc0
    SHA-256: df8e384677f5610653528144d0ff833b91fc1a224259e364da91e52f572c01db
    Size: 163.23 kB
  4. sqlite-doc-3.26.0-11.el8.noarch.rpm
    MD5: 29dfb889202d107517697d3c20b8c060
    SHA-256: 551f06844ea86af63aa50862935de8d6340b1e87f2b66985ba4d5d9e482c87c7
    Size: 6.76 MB
  5. sqlite-libs-3.26.0-11.el8.x86_64.rpm
    MD5: d9449eaabc3ec686794c6531317d76f9
    SHA-256: 3c2df5f88c99be28a454709c4664b5990caae08f942e6f3def7d5595137bd97d
    Size: 578.91 kB
  6. sqlite-3.26.0-11.el8.i686.rpm
    MD5: 84fd32117ba2f4ba44218029f2fffc31
    SHA-256: a5aafdb2d40c79802dd5fba58d3dd808503144c9f226fb4e64fdad0f654d2d2e
    Size: 712.79 kB
  7. sqlite-devel-3.26.0-11.el8.i686.rpm
    MD5: 5e1540ec33066d54bfe3c9f9784da0f1
    SHA-256: 09fbb2cc8e125f3b7b3279a97f0f35207b5d6332c2aeb4934e86a5c5c51b89e8
    Size: 163.26 kB
  8. sqlite-libs-3.26.0-11.el8.i686.rpm
    MD5: f185269c11498656bb341d0ad7e6cf2c
    SHA-256: 0f9534962878bb23f066d7187bbf072c579ce60c0930521077e3da92394bf3f3
    Size: 619.48 kB