sqlite-3.26.0-15.el8
エラータID: AXSA:2021-2598:02
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: out-of-bounds access due to the use of 32-bit memory allocator interfaces (CVE-2019-5827)
* sqlite: dropping of shadow tables not restricted in defensive mode (CVE-2019-13750)
* sqlite: fts3: improve detection of corrupted records (CVE-2019-13751)
* sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS (CVE-2019-19603)
* sqlite: NULL pointer dereference in sqlite3ExprCodeTarget() (CVE-2020-13435)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2019-13750
Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.
CVE-2019-13751
Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
CVE-2019-19603
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
CVE-2019-5827
Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-13435
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
Update packages.
Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.
Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
N/A
SRPMS
- sqlite-3.26.0-15.el8.src.rpm
MD5: 1b3febb358f8976940055dc30505f44f
SHA-256: 67fcc7cb85d3d1fed5541e65cbc11bd2a361fa1c8c209f4235fbf1ba0f889a83
Size: 22.49 MB
Asianux Server 8 for x86_64
- lemon-3.26.0-15.el8.x86_64.rpm
MD5: 043b219217f58ac77cca192539572101
SHA-256: 3e09a690bbbd846cd281b2c9b305a93ec541eac67415c23db77bf694306b8cfe
Size: 76.00 kB - sqlite-3.26.0-15.el8.x86_64.rpm
MD5: b4226e08cb8bbf960d87f609217bee67
SHA-256: 586c5909ec55fdb97687e0123e1a2412874bdd25eadbbcd941af114698c80277
Size: 667.07 kB - sqlite-devel-3.26.0-15.el8.x86_64.rpm
MD5: 6643db4de0e8400d9a725fb6db12e25d
SHA-256: 209186af620e818c8832e48ab159b90203e613165f84fe40f9b65424a8ef452f
Size: 163.86 kB - sqlite-doc-3.26.0-15.el8.noarch.rpm
MD5: 7de2a81118906827965d081823e13ba9
SHA-256: 79ec99afe7740086c558e0a625858909ae006a7296178cd70198cb860a63583c
Size: 6.76 MB - sqlite-libs-3.26.0-15.el8.x86_64.rpm
MD5: 60d4493c6201484aab9679145a141d2b
SHA-256: 8c693a3b4f9ff33b36287da781862364648b6e8f0bacb1766ddc1fbc797a27ba
Size: 579.67 kB - sqlite-3.26.0-15.el8.i686.rpm
MD5: 9ca0e9214a2ef0eb87f5e1242ae71a7a
SHA-256: b20ef13f236745646394a78610b27e440fa82e928721073452c82ee4c473556d
Size: 713.55 kB - sqlite-devel-3.26.0-15.el8.i686.rpm
MD5: 32c95546741f0ab390649c0eff5c7116
SHA-256: 581aa66b0134ccfb44942265ae46482d832ccc807825e0c8ea48e4727ead24d0
Size: 163.88 kB - sqlite-libs-3.26.0-15.el8.i686.rpm
MD5: 6e10f476194946aa785890e32ebab385
SHA-256: fd956b98747e3ffcc352c09c26eceef8a62ebf040581dd0eeae3920d16363f99
Size: 620.38 kB