Security update for sqlite3
Announcement ID: | SUSE-SU-2019:1522-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities can now be installed.
Description:
This update for sqlite3 fixes the following issues:
Security issue fixed:
- CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
- CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
- CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 LTSS 12
zypper in -t patch SUSE-SLE-SERVER-12-2019-1522=1
Package List:
-
SUSE Linux Enterprise Server 12 LTSS 12 (ppc64le s390x x86_64)
- libsqlite3-0-debuginfo-3.8.3.1-2.12.1
- sqlite3-debuginfo-3.8.3.1-2.12.1
- sqlite3-3.8.3.1-2.12.1
- sqlite3-debugsource-3.8.3.1-2.12.1
- libsqlite3-0-3.8.3.1-2.12.1
-
SUSE Linux Enterprise Server 12 LTSS 12 (s390x x86_64)
- libsqlite3-0-32bit-3.8.3.1-2.12.1
- libsqlite3-0-debuginfo-32bit-3.8.3.1-2.12.1
References:
- https://www.suse.com/security/cve/CVE-2017-10989.html
- https://www.suse.com/security/cve/CVE-2018-8740.html
- https://www.suse.com/security/cve/CVE-2019-8457.html
- https://bugzilla.suse.com/show_bug.cgi?id=1085790
- https://bugzilla.suse.com/show_bug.cgi?id=1132045
- https://bugzilla.suse.com/show_bug.cgi?id=1136976