Debian Security Advisory
DLA-2340-1 sqlite3 -- LTS security update
- Date Reported:
- 22 Aug 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-8740, CVE-2018-20346, CVE-2018-20506, CVE-2019-5827, CVE-2019-9936, CVE-2019-9937, CVE-2019-16168, CVE-2019-20218, CVE-2020-11655, CVE-2020-13434, CVE-2020-13630, CVE-2020-13632, CVE-2020-13871.
- More information:
Several vulnerabilities have been discovered in sqlite3, a C library that implements an SQL database engine.
Databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference.
When the FTS3 extension is enabled, sqlite3 encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements.
When the FTS3 extension is enabled, sqlite3 encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a
mergeoperation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements
Integer overflow allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, primarily impacting chromium.
Running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read, which may lead to an information leak.
Interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference.
A browser or other application can be triggered to crash because of inadequate parameter validation which could lead to a divide-by-zero error.
WITH stack unwinding proceeds even after a parsing error, resulting in a possible application crash.
The code related to the snippet feature exhibits a use-after-free defect.
A crafted matchinfo() query can lead to a NULL pointer dereference.
The parse tree rewrite for window functions is too late, leading to a use-after-free defect.
An improper initialization of AggInfo objects allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query.
The code in sqlite3_str_vappendf in printf.c contains an integer overflow defect.
For Debian 9 stretch, these problems have been fixed in version 3.16.2-5+deb9u2.
We recommend that you upgrade your sqlite3 packages.
For the detailed security status of sqlite3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sqlite3
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS