ALT-BU-2020-4059-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-00864
Уязвимость функции whereLoopAddBtreeIndex системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01432
Уязвимость системы управления базами данных SQLite, связанная с неконтролируемой рекурсией, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01434
Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01435
Уязвимость функции sqlite3WindowRewrite() системы управления базами данных SQLite, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01452
Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01748
Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02114
Уязвимость реализации инструкции ALTER TABLE системы управления базами данных SQLite, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-02371
Уязвимость реализации команды integrity_check PRAGMA системы управления базами данных SQLite, позволяющая нарушителю получить полный контроль над приложением
BDU:2020-03619
Уязвимость компонента isAuxiliaryVtabOperator системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04250
Уязвимость компонентов alter.c и build.c системы управления базами данных SQLite, позволяющая нарушителю переименовать произвольные столбцы в таблице
BDU:2020-04251
Уязвимость компонента ext/fts3/fts3_snippet.c системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00715
Уязвимость системы управления базами данных SQLite, связанная с записью данных за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00758
Уязвимость функции resetAccumulator из src/select.c системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00799
Уязвимость реализации функции resetAccumulator() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16168
In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
- openSUSE-SU-2019:2298
- openSUSE-SU-2019:2298
- openSUSE-SU-2019:2300
- openSUSE-SU-2019:2300
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2019-b1636e0b70
- FEDORA-2019-b1636e0b70
- GLSA-202003-16
- GLSA-202003-16
- https://security.netapp.com/advisory/ntap-20190926-0003/
- https://security.netapp.com/advisory/ntap-20190926-0003/
- https://security.netapp.com/advisory/ntap-20200122-0003/
- https://security.netapp.com/advisory/ntap-20200122-0003/
- USN-4205-1
- USN-4205-1
- https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html
- https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62
- https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62
- https://www.sqlite.org/src/timeline?c=98357d8c1263920b
- https://www.sqlite.org/src/timeline?c=98357d8c1263920b
- https://www.tenable.com/security/tns-2021-08
- https://www.tenable.com/security/tns-2021-08
- https://www.tenable.com/security/tns-2021-11
- https://www.tenable.com/security/tns-2021-11
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-19645
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
- https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://security.netapp.com/advisory/ntap-20191223-0001/
- USN-4394-1
- USN-4394-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-19646
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3
- https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3
- https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd
- https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.sqlite.org/
- https://www.sqlite.org/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-19923
flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
- https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19924
SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
- https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19925
zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618
- https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19926
multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089
- https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- USN-4298-2
- USN-4298-2
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2020-11655
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2203-1] sqlite3 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200416-0001/
- USN-4394-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11
- https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c
- https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11
- https://www.tenable.com/security/tns-2021-14
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4394-1
- https://security.netapp.com/advisory/ntap-20200416-0001/
- GLSA-202007-26
- FreeBSD-SA-20:22
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2203-1] sqlite3 security update
Modified: 2024-11-21
CVE-2020-11656
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200416-0001/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.sqlite.org/src/info/d09f8c3621d5f7f8
- https://www.tenable.com/security/tns-2021-14
- https://www3.sqlite.org/cgi/src/info/b64674919f673602
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www3.sqlite.org/cgi/src/info/b64674919f673602
- https://www.tenable.com/security/tns-2021-14
- https://www.sqlite.org/src/info/d09f8c3621d5f7f8
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://security.netapp.com/advisory/ntap-20200416-0001/
- GLSA-202007-26
- FreeBSD-SA-20:22
Modified: 2024-11-21
CVE-2020-13434
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- [debian-lts-announce] 20200526 [SECURITY] [DLA 2221-1] sqlite3
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2020-0477f8840e
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200528-0004/
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- USN-4394-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.sqlite.org/src/info/23439ea582241138
- https://www.sqlite.org/src/info/d08d3405878d394e
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- https://www.sqlite.org/src/info/d08d3405878d394e
- https://www.sqlite.org/src/info/23439ea582241138
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4394-1
- https://support.apple.com/kb/HT211952
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211843
- https://security.netapp.com/advisory/ntap-20200528-0004/
- GLSA-202007-26
- FreeBSD-SA-20:22
- FEDORA-2020-0477f8840e
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- [debian-lts-announce] 20200526 [SECURITY] [DLA 2221-1] sqlite3
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
Modified: 2024-11-21
CVE-2020-13435
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- FEDORA-2020-0477f8840e
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200528-0004/
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- USN-4394-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.sqlite.org/src/info/7a5279a25c57adf1
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- https://www.sqlite.org/src/info/7a5279a25c57adf1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4394-1
- https://support.apple.com/kb/HT211952
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211843
- https://security.netapp.com/advisory/ntap-20200528-0004/
- GLSA-202007-26
- FreeBSD-SA-20:22
- FEDORA-2020-0477f8840e
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
Modified: 2024-11-21
CVE-2020-13630
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2020-0477f8840e
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200608-0002/
- https://sqlite.org/src/info/0d69f76f0865f962
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- USN-4394-1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- USN-4394-1
- https://support.apple.com/kb/HT211952
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211843
- https://sqlite.org/src/info/0d69f76f0865f962
- https://security.netapp.com/advisory/ntap-20200608-0002/
- GLSA-202007-26
- FreeBSD-SA-20:22
- FEDORA-2020-0477f8840e
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
Modified: 2024-11-21
CVE-2020-13631
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
- FEDORA-2020-0477f8840e
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200608-0002/
- https://sqlite.org/src/info/eca0ba2cf4c0fdf7
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211952
- USN-4394-1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- USN-4394-1
- https://support.apple.com/kb/HT211952
- https://support.apple.com/kb/HT211935
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211843
- https://sqlite.org/src/info/eca0ba2cf4c0fdf7
- https://security.netapp.com/advisory/ntap-20200608-0002/
- GLSA-202007-26
- FreeBSD-SA-20:22
- FEDORA-2020-0477f8840e
- [guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
Modified: 2024-11-21
CVE-2020-13632
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2020-0477f8840e
- FreeBSD-SA-20:22
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200608-0002/
- https://sqlite.org/src/info/a4dd148928ea65bd
- USN-4394-1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- USN-4394-1
- https://sqlite.org/src/info/a4dd148928ea65bd
- https://security.netapp.com/advisory/ntap-20200608-0002/
- GLSA-202007-26
- FreeBSD-SA-20:22
- FEDORA-2020-0477f8840e
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
Modified: 2024-11-21
CVE-2020-13871
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2020-d0f892b069
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200619-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://security.netapp.com/advisory/ntap-20200619-0002/
- GLSA-202007-26
- FEDORA-2020-d0f892b069
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Modified: 2024-11-21
CVE-2020-15358
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
- 20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave
- 20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- GLSA-202007-26
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200709-0001/
- https://security.netapp.com/advisory/ntap-20200709-0001/
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211843
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211844
- https://support.apple.com/kb/HT211847
- https://support.apple.com/kb/HT211847
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211850
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT211931
- https://support.apple.com/kb/HT212147
- https://support.apple.com/kb/HT212147
- USN-4438-1
- USN-4438-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.sqlite.org/src/info/10fa79d00f8091e5
- https://www.sqlite.org/src/info/10fa79d00f8091e5
- https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2
- https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2
- https://www.sqlite.org/src/tktview?name=8f157e8010
- https://www.sqlite.org/src/tktview?name=8f157e8010
Modified: 2024-11-21
CVE-2020-9327
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- GLSA-202003-16
- GLSA-202003-16
- https://security.netapp.com/advisory/ntap-20200313-0002/
- https://security.netapp.com/advisory/ntap-20200313-0002/
- USN-4298-1
- USN-4298-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.sqlite.org/cgi/src/info/4374860b29383380
- https://www.sqlite.org/cgi/src/info/4374860b29383380
- https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e
- https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e
- https://www.sqlite.org/cgi/src/info/abc473fb8fb99900
- https://www.sqlite.org/cgi/src/info/abc473fb8fb99900
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-24614
Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.
- openSUSE-SU-2020:1478
- openSUSE-SU-2020:1478
- [oss-security] 20200825 Re: Fossil-SCM patch fixes RCE in all historic versions
- [oss-security] 20200825 Re: Fossil-SCM patch fixes RCE in all historic versions
- https://fossil-scm.org/forum/info/a05ae3ce7760daf6
- https://fossil-scm.org/forum/info/a05ae3ce7760daf6
- https://fossil-scm.org/fossil/vdiff?branch=sec2020-2.12-patch&diff=1&w
- https://fossil-scm.org/fossil/vdiff?branch=sec2020-2.12-patch&diff=1&w
- FEDORA-2020-50be892d25
- FEDORA-2020-50be892d25
- FEDORA-2020-ac6cf99f87
- FEDORA-2020-ac6cf99f87
- GLSA-202011-04
- GLSA-202011-04
- https://www.openwall.com/lists/oss-security/2020/08/20/1
- https://www.openwall.com/lists/oss-security/2020/08/20/1
No data currently available.
Closed vulnerabilities
BDU:2022-00268
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00271
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-00273
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00332
Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-15945
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68
- https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-15946
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
- https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- https://github.com/OpenSC/OpenSC/compare/f1691fc...12218d4
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-19479
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18693
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18693
- https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2
- https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2
- [debian-lts-announce] 20191226 [SECURITY] [DLA 2046-1] opensc security update
- [debian-lts-announce] 20191226 [SECURITY] [DLA 2046-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- [debian-lts-announce] 20211129 [SECURITY] [DLA 2832-1] opensc security update
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-19480
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478
- https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
- https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-19481
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-cac1.c mishandles buffer limits for CAC certificates.
- [oss-security] 20191229 OpenSC 0.20.0 released
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18618
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18618
- https://github.com/OpenSC/OpenSC/commit/b75c002cfb1fd61cd20ec938ff4937d7b1a94278
- https://github.com/OpenSC/OpenSC/commit/b75c002cfb1fd61cd20ec938ff4937d7b1a94278
- FEDORA-2020-3c93790abe
- FEDORA-2020-3c93790abe
Modified: 2024-11-21
CVE-2019-20792
OpenSC before 0.20.0 has a double free in coolkey_free_private_data because coolkey_add_object in libopensc/card-coolkey.c lacks a uniqueness check.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19208
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19208
- https://github.com/OpenSC/OpenSC/commit/c246f6f69a749d4f68626b40795a4f69168008f4
- https://github.com/OpenSC/OpenSC/commit/c246f6f69a749d4f68626b40795a4f69168008f4
- https://github.com/OpenSC/OpenSC/compare/0.19.0...0.20.0
- https://github.com/OpenSC/OpenSC/compare/0.19.0...0.20.0
Modified: 2024-11-21
CVE-2019-6502
sc_context_create in ctx.c in libopensc in OpenSC 0.19.0 has a memory leak, as demonstrated by a call from eidenv.
- [oss-security] 20191229 OpenSC 0.20.0 released
- https://github.com/OpenSC/OpenSC/issues/1586
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- [oss-security] 20191229 OpenSC 0.20.0 released
- [debian-lts-announce] 20230621 [SECURITY] [DLA 3463-1] opensc security update
- https://github.com/OpenSC/OpenSC/issues/1586
Package gimagereader updated to version 3.3.1-alt4 for branch p9 in task 258655.
Closed bugs
Ломается сборка gimagereader после обновления до cmake-3.17.3