Vulnerability from csaf_opensuse
Published
2021-07-19 21:03
Modified
2021-07-19 21:03
Summary
Security update for sqlite3
Notes
Title of the patch
Security update for sqlite3
Description of the patch
This update for sqlite3 fixes the following issues:
- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
(bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2021-1058
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for sqlite3", title: "Title of the patch", }, { category: "description", text: "This update for sqlite3 fixes the following issues:\n\n- Update to version 3.36.0\n- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener\n optimization (bsc#1173641)\n- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in\n isAuxiliaryVtabOperator (bsc#1164719)\n- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)\n- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\\0' input (bsc#1160438)\n- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer\n dereference (bsc#1160309)\n- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)\n- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)\n- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)\n- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference\n (bsc#1159491)\n- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with\n a shadow table name (bsc#1158960)\n- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated\n columns (bsc#1158959)\n- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views\n in conjunction with ALTER TABLE statements (bsc#1158958)\n- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,\n which allows attackers to cause a denial of service (bsc#1158812)\n- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a\n sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)\n- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)\n- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)\n- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)\n- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow\n- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)\n- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)\n- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-1058", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1058-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:1058-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:1058-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/", }, { category: "self", summary: "SUSE Bug 1157818", url: "https://bugzilla.suse.com/1157818", }, { category: "self", summary: "SUSE Bug 1158812", url: "https://bugzilla.suse.com/1158812", }, { category: "self", summary: "SUSE Bug 1158958", url: "https://bugzilla.suse.com/1158958", }, { category: "self", summary: "SUSE Bug 1158959", url: "https://bugzilla.suse.com/1158959", }, { category: "self", summary: "SUSE Bug 1158960", url: "https://bugzilla.suse.com/1158960", }, { category: "self", summary: "SUSE Bug 1159491", url: "https://bugzilla.suse.com/1159491", }, { category: "self", summary: "SUSE Bug 1159715", url: "https://bugzilla.suse.com/1159715", }, { category: "self", summary: "SUSE Bug 1159847", url: "https://bugzilla.suse.com/1159847", }, { category: "self", summary: "SUSE Bug 1159850", url: "https://bugzilla.suse.com/1159850", }, { category: "self", summary: "SUSE Bug 1160309", url: "https://bugzilla.suse.com/1160309", }, { category: "self", summary: "SUSE Bug 1160438", url: "https://bugzilla.suse.com/1160438", }, { category: "self", summary: "SUSE Bug 1160439", url: "https://bugzilla.suse.com/1160439", }, { category: "self", summary: "SUSE Bug 1164719", url: "https://bugzilla.suse.com/1164719", }, { category: "self", summary: "SUSE Bug 1172091", url: "https://bugzilla.suse.com/1172091", }, { category: "self", summary: "SUSE Bug 1172115", url: "https://bugzilla.suse.com/1172115", }, { category: "self", summary: "SUSE Bug 1172234", url: "https://bugzilla.suse.com/1172234", }, { category: "self", summary: "SUSE Bug 1172236", url: "https://bugzilla.suse.com/1172236", }, { category: "self", summary: "SUSE Bug 1172240", url: "https://bugzilla.suse.com/1172240", }, { category: "self", summary: "SUSE Bug 1173641", url: "https://bugzilla.suse.com/1173641", }, { category: "self", summary: "SUSE Bug 928700", url: "https://bugzilla.suse.com/928700", }, { category: "self", summary: "SUSE Bug 928701", url: "https://bugzilla.suse.com/928701", }, { category: "self", summary: "SUSE CVE CVE-2015-3414 page", url: "https://www.suse.com/security/cve/CVE-2015-3414/", }, { category: "self", summary: "SUSE CVE CVE-2015-3415 page", url: "https://www.suse.com/security/cve/CVE-2015-3415/", }, { category: "self", summary: "SUSE CVE CVE-2019-19244 page", url: "https://www.suse.com/security/cve/CVE-2019-19244/", }, { category: "self", summary: "SUSE CVE CVE-2019-19317 page", url: "https://www.suse.com/security/cve/CVE-2019-19317/", }, { category: "self", summary: "SUSE CVE CVE-2019-19603 page", url: "https://www.suse.com/security/cve/CVE-2019-19603/", }, { category: "self", summary: "SUSE CVE CVE-2019-19645 page", url: "https://www.suse.com/security/cve/CVE-2019-19645/", }, { category: "self", summary: "SUSE CVE CVE-2019-19646 page", url: "https://www.suse.com/security/cve/CVE-2019-19646/", }, { category: "self", summary: "SUSE CVE CVE-2019-19880 page", url: "https://www.suse.com/security/cve/CVE-2019-19880/", }, { category: "self", summary: "SUSE CVE CVE-2019-19923 page", url: "https://www.suse.com/security/cve/CVE-2019-19923/", }, { category: "self", summary: "SUSE CVE CVE-2019-19924 page", url: "https://www.suse.com/security/cve/CVE-2019-19924/", }, { category: "self", summary: "SUSE CVE CVE-2019-19925 page", url: "https://www.suse.com/security/cve/CVE-2019-19925/", }, { category: "self", summary: "SUSE CVE CVE-2019-19926 page", url: "https://www.suse.com/security/cve/CVE-2019-19926/", }, { category: "self", summary: "SUSE CVE CVE-2019-19959 page", url: "https://www.suse.com/security/cve/CVE-2019-19959/", }, { category: "self", summary: "SUSE CVE CVE-2019-20218 page", url: "https://www.suse.com/security/cve/CVE-2019-20218/", }, { category: "self", summary: "SUSE CVE CVE-2020-13434 page", url: "https://www.suse.com/security/cve/CVE-2020-13434/", }, { category: "self", summary: "SUSE CVE CVE-2020-13435 page", url: "https://www.suse.com/security/cve/CVE-2020-13435/", }, { category: "self", summary: "SUSE CVE CVE-2020-13630 page", url: "https://www.suse.com/security/cve/CVE-2020-13630/", }, { category: "self", summary: "SUSE CVE CVE-2020-13631 page", url: "https://www.suse.com/security/cve/CVE-2020-13631/", }, { category: "self", summary: "SUSE CVE CVE-2020-13632 page", url: "https://www.suse.com/security/cve/CVE-2020-13632/", }, { category: "self", summary: "SUSE CVE CVE-2020-15358 page", url: "https://www.suse.com/security/cve/CVE-2020-15358/", }, { category: "self", summary: "SUSE CVE CVE-2020-9327 page", url: "https://www.suse.com/security/cve/CVE-2020-9327/", }, ], title: "Security update for sqlite3", tracking: { current_release_date: "2021-07-19T21:03:43Z", generator: { date: "2021-07-19T21:03:43Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:1058-1", initial_release_date: "2021-07-19T21:03:43Z", revision_history: [ { date: "2021-07-19T21:03:43Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsqlite3-0-3.36.0-lp152.4.3.1.i586", product: { name: "libsqlite3-0-3.36.0-lp152.4.3.1.i586", product_id: "libsqlite3-0-3.36.0-lp152.4.3.1.i586", }, }, { category: "product_version", name: "sqlite3-3.36.0-lp152.4.3.1.i586", product: { name: "sqlite3-3.36.0-lp152.4.3.1.i586", product_id: "sqlite3-3.36.0-lp152.4.3.1.i586", }, }, { category: "product_version", name: "sqlite3-devel-3.36.0-lp152.4.3.1.i586", product: { name: "sqlite3-devel-3.36.0-lp152.4.3.1.i586", product_id: "sqlite3-devel-3.36.0-lp152.4.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "sqlite3-doc-3.36.0-lp152.4.3.1.noarch", product: { name: "sqlite3-doc-3.36.0-lp152.4.3.1.noarch", product_id: "sqlite3-doc-3.36.0-lp152.4.3.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", product: { name: "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", product_id: "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", }, }, { category: "product_version", name: "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", product: { name: "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", product_id: "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", }, }, { category: "product_version", name: "sqlite3-3.36.0-lp152.4.3.1.x86_64", product: { name: "sqlite3-3.36.0-lp152.4.3.1.x86_64", product_id: "sqlite3-3.36.0-lp152.4.3.1.x86_64", }, }, { category: "product_version", name: "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", product: { name: "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", product_id: "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsqlite3-0-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", }, product_reference: "libsqlite3-0-3.36.0-lp152.4.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", }, product_reference: "libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", }, product_reference: "libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "sqlite3-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", }, product_reference: "sqlite3-3.36.0-lp152.4.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "sqlite3-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", }, product_reference: "sqlite3-3.36.0-lp152.4.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "sqlite3-devel-3.36.0-lp152.4.3.1.i586 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", }, product_reference: "sqlite3-devel-3.36.0-lp152.4.3.1.i586", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", }, product_reference: "sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "sqlite3-doc-3.36.0-lp152.4.3.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", }, product_reference: "sqlite3-doc-3.36.0-lp152.4.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2015-3414", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3414", }, ], notes: [ { category: "general", text: "SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2015-3414", url: "https://www.suse.com/security/cve/CVE-2015-3414", }, { category: "external", summary: "SUSE Bug 1085790 for CVE-2015-3414", url: "https://bugzilla.suse.com/1085790", }, { category: "external", summary: "SUSE Bug 1190372 for CVE-2015-3414", url: "https://bugzilla.suse.com/1190372", }, { category: "external", summary: "SUSE Bug 1193078 for CVE-2015-3414", url: "https://bugzilla.suse.com/1193078", }, { category: "external", summary: "SUSE Bug 928700 for CVE-2015-3414", url: "https://bugzilla.suse.com/928700", }, { category: "external", summary: "SUSE Bug 928701 for CVE-2015-3414", url: "https://bugzilla.suse.com/928701", }, { category: "external", summary: "SUSE Bug 928702 for CVE-2015-3414", url: "https://bugzilla.suse.com/928702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2015-3414", }, { cve: "CVE-2015-3415", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3415", }, ], notes: [ { category: "general", text: "The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2015-3415", url: "https://www.suse.com/security/cve/CVE-2015-3415", }, { category: "external", summary: "SUSE Bug 1190372 for CVE-2015-3415", url: "https://bugzilla.suse.com/1190372", }, { category: "external", summary: "SUSE Bug 928700 for CVE-2015-3415", url: "https://bugzilla.suse.com/928700", }, { category: "external", summary: "SUSE Bug 928701 for CVE-2015-3415", url: "https://bugzilla.suse.com/928701", }, { category: "external", summary: "SUSE Bug 928702 for CVE-2015-3415", url: "https://bugzilla.suse.com/928702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2015-3415", }, { cve: "CVE-2019-19244", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19244", }, ], notes: [ { category: "general", text: "sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19244", url: "https://www.suse.com/security/cve/CVE-2019-19244", }, { category: "external", summary: "SUSE Bug 1157817 for CVE-2019-19244", url: "https://bugzilla.suse.com/1157817", }, { category: "external", summary: "SUSE Bug 1157818 for CVE-2019-19244", url: "https://bugzilla.suse.com/1157818", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19244", }, { cve: "CVE-2019-19317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19317", }, ], notes: [ { category: "general", text: "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19317", url: "https://www.suse.com/security/cve/CVE-2019-19317", }, { category: "external", summary: "SUSE Bug 1158812 for CVE-2019-19317", url: "https://bugzilla.suse.com/1158812", }, { category: "external", summary: "SUSE Bug 1196773 for CVE-2019-19317", url: "https://bugzilla.suse.com/1196773", }, { category: "external", summary: "SUSE Bug 1196775 for CVE-2019-19317", url: "https://bugzilla.suse.com/1196775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "low", }, ], title: "CVE-2019-19317", }, { cve: "CVE-2019-19603", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19603", }, ], notes: [ { category: "general", text: "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19603", url: "https://www.suse.com/security/cve/CVE-2019-19603", }, { category: "external", summary: "SUSE Bug 1158960 for CVE-2019-19603", url: "https://bugzilla.suse.com/1158960", }, { category: "external", summary: "SUSE Bug 1193078 for CVE-2019-19603", url: "https://bugzilla.suse.com/1193078", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "important", }, ], title: "CVE-2019-19603", }, { cve: "CVE-2019-19645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19645", }, ], notes: [ { category: "general", text: "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19645", url: "https://www.suse.com/security/cve/CVE-2019-19645", }, { category: "external", summary: "SUSE Bug 1158958 for CVE-2019-19645", url: "https://bugzilla.suse.com/1158958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19645", }, { cve: "CVE-2019-19646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19646", }, ], notes: [ { category: "general", text: "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19646", url: "https://www.suse.com/security/cve/CVE-2019-19646", }, { category: "external", summary: "SUSE Bug 1158959 for CVE-2019-19646", url: "https://bugzilla.suse.com/1158959", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19646", }, { cve: "CVE-2019-19880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19880", }, ], notes: [ { category: "general", text: "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19880", url: "https://www.suse.com/security/cve/CVE-2019-19880", }, { category: "external", summary: "SUSE Bug 1159491 for CVE-2019-19880", url: "https://bugzilla.suse.com/1159491", }, { category: "external", summary: "SUSE Bug 1159715 for CVE-2019-19880", url: "https://bugzilla.suse.com/1159715", }, { category: "external", summary: "SUSE Bug 1162833 for CVE-2019-19880", url: "https://bugzilla.suse.com/1162833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "important", }, ], title: "CVE-2019-19880", }, { cve: "CVE-2019-19923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19923", }, ], notes: [ { category: "general", text: "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19923", url: "https://www.suse.com/security/cve/CVE-2019-19923", }, { category: "external", summary: "SUSE Bug 1160309 for CVE-2019-19923", url: "https://bugzilla.suse.com/1160309", }, { category: "external", summary: "SUSE Bug 1162833 for CVE-2019-19923", url: "https://bugzilla.suse.com/1162833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19923", }, { cve: "CVE-2019-19924", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19924", }, ], notes: [ { category: "general", text: "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19924", url: "https://www.suse.com/security/cve/CVE-2019-19924", }, { category: "external", summary: "SUSE Bug 1159850 for CVE-2019-19924", url: "https://bugzilla.suse.com/1159850", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19924", }, { cve: "CVE-2019-19925", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19925", }, ], notes: [ { category: "general", text: "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19925", url: "https://www.suse.com/security/cve/CVE-2019-19925", }, { category: "external", summary: "SUSE Bug 1159847 for CVE-2019-19925", url: "https://bugzilla.suse.com/1159847", }, { category: "external", summary: "SUSE Bug 1162833 for CVE-2019-19925", url: "https://bugzilla.suse.com/1162833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "low", }, ], title: "CVE-2019-19925", }, { cve: "CVE-2019-19926", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19926", }, ], notes: [ { category: "general", text: "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19926", url: "https://www.suse.com/security/cve/CVE-2019-19926", }, { category: "external", summary: "SUSE Bug 1159491 for CVE-2019-19926", url: "https://bugzilla.suse.com/1159491", }, { category: "external", summary: "SUSE Bug 1159715 for CVE-2019-19926", url: "https://bugzilla.suse.com/1159715", }, { category: "external", summary: "SUSE Bug 1162833 for CVE-2019-19926", url: "https://bugzilla.suse.com/1162833", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "important", }, ], title: "CVE-2019-19926", }, { cve: "CVE-2019-19959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19959", }, ], notes: [ { category: "general", text: "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-19959", url: "https://www.suse.com/security/cve/CVE-2019-19959", }, { category: "external", summary: "SUSE Bug 1160438 for CVE-2019-19959", url: "https://bugzilla.suse.com/1160438", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2019-19959", }, { cve: "CVE-2019-20218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20218", }, ], notes: [ { category: "general", text: "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2019-20218", url: "https://www.suse.com/security/cve/CVE-2019-20218", }, { category: "external", summary: "SUSE Bug 1160439 for CVE-2019-20218", url: "https://bugzilla.suse.com/1160439", }, { category: "external", summary: "SUSE Bug 1189840 for CVE-2019-20218", url: "https://bugzilla.suse.com/1189840", }, { category: "external", summary: "SUSE Bug 1190372 for CVE-2019-20218", url: "https://bugzilla.suse.com/1190372", }, { category: "external", summary: "SUSE Bug 1192495 for CVE-2019-20218", url: "https://bugzilla.suse.com/1192495", }, { category: "external", summary: "SUSE Bug 1193078 for CVE-2019-20218", url: "https://bugzilla.suse.com/1193078", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "important", }, ], title: "CVE-2019-20218", }, { cve: "CVE-2020-13434", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13434", }, ], notes: [ { category: "general", text: "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13434", url: "https://www.suse.com/security/cve/CVE-2020-13434", }, { category: "external", summary: "SUSE Bug 1172115 for CVE-2020-13434", url: "https://bugzilla.suse.com/1172115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-13434", }, { cve: "CVE-2020-13435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13435", }, ], notes: [ { category: "general", text: "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13435", url: "https://www.suse.com/security/cve/CVE-2020-13435", }, { category: "external", summary: "SUSE Bug 1172091 for CVE-2020-13435", url: "https://bugzilla.suse.com/1172091", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "important", }, ], title: "CVE-2020-13435", }, { cve: "CVE-2020-13630", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13630", }, ], notes: [ { category: "general", text: "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13630", url: "https://www.suse.com/security/cve/CVE-2020-13630", }, { category: "external", summary: "SUSE Bug 1172234 for CVE-2020-13630", url: "https://bugzilla.suse.com/1172234", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-13630", }, { cve: "CVE-2020-13631", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13631", }, ], notes: [ { category: "general", text: "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13631", url: "https://www.suse.com/security/cve/CVE-2020-13631", }, { category: "external", summary: "SUSE Bug 1172236 for CVE-2020-13631", url: "https://bugzilla.suse.com/1172236", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-13631", }, { cve: "CVE-2020-13632", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13632", }, ], notes: [ { category: "general", text: "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13632", url: "https://www.suse.com/security/cve/CVE-2020-13632", }, { category: "external", summary: "SUSE Bug 1172240 for CVE-2020-13632", url: "https://bugzilla.suse.com/1172240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-13632", }, { cve: "CVE-2020-15358", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15358", }, ], notes: [ { category: "general", text: "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-15358", url: "https://www.suse.com/security/cve/CVE-2020-15358", }, { category: "external", summary: "SUSE Bug 1173641 for CVE-2020-15358", url: "https://bugzilla.suse.com/1173641", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-15358", }, { cve: "CVE-2020-9327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-9327", }, ], notes: [ { category: "general", text: "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-9327", url: "https://www.suse.com/security/cve/CVE-2020-9327", }, { category: "external", summary: "SUSE Bug 1164719 for CVE-2020-9327", url: "https://bugzilla.suse.com/1164719", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.i586", "openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1.x86_64", "openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2021-07-19T21:03:43Z", details: "moderate", }, ], title: "CVE-2020-9327", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.