Security update for sqlite3

SUSE Security Update: Security update for sqlite3
Announcement ID: SUSE-SU-2019:1522-1
Rating: important
References: #1085790 #1132045 #1136976
Cross-References: CVE-2017-10989 CVE-2018-8740 CVE-2019-8457
Affected Products:
  • SUSE Linux Enterprise Server 12-LTSS

An update that fixes three vulnerabilities is now available.

Description:

This update for sqlite3 fixes the following issues:
Security issue fixed:

  • CVE-2019-8457: Fixed a Heap out-of-bound read in rtreenode() when handling invalid rtree tables (bsc#1136976).
  • CVE-2018-8740: Fixed a NULL pointer dereference related to corrupted databases schemas (bsc#1085790).
  • CVE-2017-10989: Fixed a heap-based buffer over-read in getNodeSize() (bsc#1132045).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Server 12-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-2019-1522=1

Package List:

  • SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):
    • libsqlite3-0-3.8.3.1-2.12.1
    • libsqlite3-0-debuginfo-3.8.3.1-2.12.1
    • sqlite3-3.8.3.1-2.12.1
    • sqlite3-debuginfo-3.8.3.1-2.12.1
    • sqlite3-debugsource-3.8.3.1-2.12.1
  • SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):
    • libsqlite3-0-32bit-3.8.3.1-2.12.1
    • libsqlite3-0-debuginfo-32bit-3.8.3.1-2.12.1

References: