Security update for sqlite3

SUSE Security Update: Security update for sqlite3
Announcement ID: SUSE-SU-2019:1522-1
Rating: important
References: #1085790 #1132045 #1136976
Cross-References: CVE-2017-10989 CVE-2018-8740 CVE-2019-8457
Affected Products:
  • SUSE Linux Enterprise Server 12-LTSS

An update that fixes three vulnerabilities is now available.


This update for sqlite3 fixes the following issues:
Security issue fixed:

  • CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
  • CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
  • CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-2019-1522=1

Package List:

  • SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
    • libsqlite3-0-
    • libsqlite3-0-debuginfo-
    • sqlite3-
    • sqlite3-debuginfo-
    • sqlite3-debugsource-
  • SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
    • libsqlite3-0-32bit-
    • libsqlite3-0-debuginfo-32bit-