File _patchinfo of Package patchinfo.21241
<patchinfo incident="21241">
<issue tracker="jsc" id="SLE-16032"/>
<issue tracker="bnc" id="1158958">VUL-0: CVE-2019-19645: sqlite3: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements</issue>
<issue tracker="bnc" id="1173641">VUL-0: CVE-2020-15358: sqlite3: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener optimization</issue>
<issue tracker="bnc" id="1172236">VUL-0: CVE-2020-13631: sqlite3: a virtual table is allowed to be renamed to the name of one of its shadow tables leading to infinite loop</issue>
<issue tracker="bnc" id="1158812">VUL-1: CVE-2019-19317: sqlite3: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service</issue>
<issue tracker="bnc" id="928700">VUL-1: CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names</issue>
<issue tracker="bnc" id="1159715">VUL-1: CVE-2019-19926: sqlite3: improper handling of certain errors during parsing multiSelect in select.c</issue>
<issue tracker="bnc" id="1172234">VUL-0: CVE-2020-13630: sqlite3: use-after-free in fts3EvalNextRow</issue>
<issue tracker="bnc" id="1160309">VUL-1: CVE-2019-19923: sqlite3 : improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer dereference</issue>
<issue tracker="bnc" id="1172240">VUL-0: CVE-2020-13632: sqlite3: null pointer dereference via a crafted matchinfo() query</issue>
<issue tracker="bnc" id="1172115">VUL-0: CVE-2020-13434: sqlite3: integer overflow in sqlite3_str_vappendf in printf.c.</issue>
<issue tracker="bnc" id="1160439">VUL-0: CVE-2019-20218: sqlite3: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error</issue>
<issue tracker="bnc" id="1158959">VUL-1: CVE-2019-19646: sqlite3: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns</issue>
<issue tracker="bnc" id="1172091">VUL-0: CVE-2020-13435: sqlite3: Segfault in sqlite3ExprCodeTarget</issue>
<issue tracker="bnc" id="1159850">VUL-1: CVE-2019-19924: sqlite3: improper error handling in sqlite3WindowRewrite()</issue>
<issue tracker="bnc" id="1160438">VUL-0: CVE-2019-19959: sqlite3: memory-management error via ext/misc/zipfile.c involving embedded '\0' input</issue>
<issue tracker="bnc" id="928701">VUL-1: CVE-2015-3415: sqlite3: sqlite3VdbeExec comparison operator vulnerability</issue>
<issue tracker="bnc" id="1159847">VUL-1: CVE-2019-19925: sqlite3: improper handling of NULL pathname during an update of a ZIP archive</issue>
<issue tracker="bnc" id="1158960">VUL-1: CVE-2019-19603: sqlite3: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with a shadow table name</issue>
<issue tracker="bnc" id="1159491">VUL-1: CVE-2019-19880: sqlite3: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference</issue>
<issue tracker="bnc" id="1157818">VUL-0: CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage</issue>
<issue tracker="bnc" id="1164719">VUL-1: CVE-2020-9327: sqlite3: NULL pointer dereference and segmentation fault because of generated column optimizations in isAuxiliaryVtabOperator</issue>
<issue tracker="cve" id="2019-19880"/>
<issue tracker="cve" id="2020-13631"/>
<issue tracker="cve" id="2015-3415"/>
<issue tracker="cve" id="2019-19924"/>
<issue tracker="cve" id="2019-19959"/>
<issue tracker="cve" id="2018-20346"/>
<issue tracker="cve" id="2019-19645"/>
<issue tracker="cve" id="2019-19244"/>
<issue tracker="cve" id="2019-19926"/>
<issue tracker="cve" id="2019-19646"/>
<issue tracker="cve" id="2019-19923"/>
<issue tracker="cve" id="2019-19925"/>
<issue tracker="cve" id="2018-8740"/>
<issue tracker="cve" id="2019-20218"/>
<issue tracker="cve" id="2019-19603"/>
<issue tracker="cve" id="2017-10989"/>
<issue tracker="cve" id="2016-6153"/>
<issue tracker="cve" id="2015-3414"/>
<issue tracker="cve" id="2020-9327"/>
<issue tracker="cve" id="2020-13434"/>
<issue tracker="cve" id="2020-13435"/>
<issue tracker="cve" id="2017-2518"/>
<issue tracker="cve" id="2020-13630"/>
<issue tracker="cve" id="2020-13632"/>
<issue tracker="cve" id="2019-19317"/>
<issue tracker="cve" id="2019-16168"/>
<issue tracker="cve" id="2019-8457"/>
<issue tracker="cve" id="2020-15358"/>
<packager>rmax</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for sqlite3</summary>
<description>This update for sqlite3 fixes the following issues:
sqlite3 is sync version 3.36.0 from Factory (jsc#SLE-16032).
The following CVEs have been fixed in upstream releases up to
this point, but were not mentioned in the change log so far:
* bsc#1173641, CVE-2020-15358: heap-based buffer overflow in
multiSelectOrderBy due to mishandling of query-flattener
optimization
* bsc#1164719, CVE-2020-9327: NULL pointer dereference and
segmentation fault because of generated column optimizations in
isAuxiliaryVtabOperator
* bsc#1160439, CVE-2019-20218: selectExpander in select.c proceeds
with WITH stack unwinding even after a parsing error
* bsc#1160438, CVE-2019-19959: memory-management error via
ext/misc/zipfile.c involving embedded '\0' input
* bsc#1160309, CVE-2019-19923: improper handling of certain uses
of SELECT DISTINCT in flattenSubquery may lead to null pointer
dereference
* bsc#1159850, CVE-2019-19924: improper error handling in
sqlite3WindowRewrite()
* bsc#1159847, CVE-2019-19925: improper handling of NULL pathname
during an update of a ZIP archive
* bsc#1159715, CVE-2019-19926: improper handling of certain
errors during parsing multiSelect in select.c
* bsc#1159491, CVE-2019-19880: exprListAppendList in window.c
allows attackers to trigger an invalid pointer dereference
* bsc#1158960, CVE-2019-19603: during handling of CREATE TABLE
and CREATE VIEW statements, does not consider confusion with
a shadow table name
* bsc#1158959, CVE-2019-19646: pragma.c mishandles NOT NULL in an
integrity_check PRAGMA command in certain cases of generated
columns
* bsc#1158958, CVE-2019-19645: alter.c allows attackers to trigger
infinite recursion via certain types of self-referential views
in conjunction with ALTER TABLE statements
* bsc#1158812, CVE-2019-19317: lookupName in resolve.c omits bits
from the colUsed bitmask in the case of a generated column,
which allows attackers to cause a denial of service
* bsc#1157818, CVE-2019-19244: sqlite3,sqlite2,sqlite: The
function sqlite3Select in select.c allows a crash if a
sub-select uses both DISTINCT and window functions, and also
has certain ORDER BY usage
* bsc#928701, CVE-2015-3415: sqlite3VdbeExec comparison operator
vulnerability
* bsc#928700, CVE-2015-3414: sqlite3,sqlite2: dequoting of
collation-sequence names
* CVE-2020-13434 bsc#1172115: integer overflow in
sqlite3_str_vappendf
* CVE-2020-13630 bsc#1172234: use-after-free in fts3EvalNextRow
* CVE-2020-13631 bsc#1172236: virtual table allowed to be renamed
to one of its shadow tables
* CVE-2020-13632 bsc#1172240: NULL pointer dereference via
crafted matchinfo() query
* CVE-2020-13435: Malicious SQL statements could have crashed the
process that is running SQLite (bsc#1172091)
</description>
</patchinfo>