{"id":"MGASA-2021-0303","summary":"Updated sqlite3 packages fix security vulnerabilities","details":"In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL\npointer dereference and segmentation fault because of generated column\noptimizations (CVE-2020-9327).\n\nSQLite through 3.31.1 allows attackers to cause a denial of service\n(segmentation fault) via a malformed window-function query because the\nAggInfo object's initialization is mishandled\n(CVE-2020-11655).\n\nSQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in\nprintf.c (CVE-2020-13434).\n\nSQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in\nexpr.c (CVE-2020-13435).\n\next/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow,\nrelated to the snippet feature (CVE-2020-13630).\n\nSQLite before 3.32.0 allows a virtual table to be renamed to the name of one\nof its shadow tables, related to alter.c and build.c (CVE-2020-13631).\n\next/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference\nvia a crafted matchinfo() query (CVE-2020-13632).\n\nSQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the\nparse tree rewrite for window functions is too late (CVE-2020-13871).\n\nIn SQLite before 3.32.3, select.c mishandles query-flattener optimization,\nleading to a multiSelectOrderBy heap overflow because of misuse of transitive\nproperties for constant propagation (CVE-2020-15358).\n","modified":"2026-04-16T04:43:20.731127999Z","published":"2021-06-30T23:58:41Z","upstream":["CVE-2020-11655","CVE-2020-13434","CVE-2020-13435","CVE-2020-13630","CVE-2020-13631","CVE-2020-13632","CVE-2020-13871","CVE-2020-15358","CVE-2020-9327"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0303.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26270"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"type":"WEB","url":"https://www.debian.org/lts/security/2020/dla-2340"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BN32AGQPMHZRNM6P6L5GZPETOWTGXOKP/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4438-1"},{"type":"WEB","url":"https://www.sqlite.org/releaselog/3_32_3.html"},{"type":"WEB","url":"https://www.sqlite.org/releaselog/3_32_2.html"},{"type":"WEB","url":"https://www.sqlite.org/releaselog/3_32_1.html"},{"type":"WEB","url":"https://www.sqlite.org/releaselog/3_32_0.html"},{"type":"WEB","url":"https://usn.ubuntu.com/4394-1/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/"},{"type":"WEB","url":"https://www.debian.org/lts/security/2020/dla-2221"}],"affected":[{"package":{"name":"sqlite3","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/sqlite3?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.31.1-1.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0303.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}