Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits: afc2c368 by Sylvain Beucler at 2023-04-29T18:45:13+02:00 sqlite: associate past sqlite3 CVEs to sqlite + buster triage (open + 2020-2022) See https://lists.debian.org/debian-lts/2023/04/msg00027.html for context - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -32197,6 +32197,7 @@ CVE-2022-46908 (SQLite through 3.40.0, when relying on --safe for execution of a - sqlite3 3.40.0-2 (bug #1026293) [bullseye] - sqlite3 <not-affected> (Vulnerable code introduced later) [buster] - sqlite3 <not-affected> (Vulnerable code introduced later) + - sqlite <not-affected> (--safe introduced in v3.36.0) NOTE: https://sqlite.org/forum/forumpost/07beac8056151b2f NOTE: Fixed by: https://sqlite.org/src/info/cefc032473ac5ad2 CVE-2022-4416 (A vulnerability was found in RainyGao DocSys. It has been declared as ...) @@ -66002,6 +66003,7 @@ CVE-2022-35738 RESERVED CVE-2022-35737 (SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-b ...) - sqlite3 3.39.2-1 (unimportant) + - sqlite <removed> (unimportant) NOTE: https://sqlite.org/forum/forumpost/3607259d3c NOTE: Debian sqlite3 packages not compiled with -DSQLITE_ENABLE_STAT4 NOTE: https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/ @@ -109565,6 +109567,7 @@ CVE-2021-45347 (An Incorrect Access Control vulnerability exists in zzcms 8.2, w NOT-FOR-US: zzcms CVE-2021-45346 (A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 an ...) - sqlite3 <unfixed> (unimportant; bug #1005974) + - sqlite <removed> (unimportant) NOTE: https://github.com/guyinatuxedo/sqlite3_record_leaking NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2054793 NOTE: https://sqlite.org/forum/forumpost/056d557c2f8c452ed5bb9c215414c802b215ce437be82be047726e521342161e @@ -136836,6 +136839,7 @@ CVE-2021-36691 (libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl CVE-2021-36690 (A segmentation fault can occur in the sqlite3.exe command-line compone ...) - sqlite3 3.36.0-2 (unimportant) [stretch] - sqlite3 <not-affected> (vulnerable code is not present) + - sqlite <not-affected> (Vulnerable code is not present) NOTE: https://www.sqlite.org/forum/forumpost/718c0a8d17 CVE-2021-36689 (An issue discovered in com.samourai.wallet.PinEntryActivity.java in St ...) NOT-FOR-US: com.samourai.wallet.PinEntryActivity.java @@ -179755,6 +179759,7 @@ CVE-2021-20227 (A flaw was found in SQLite's SELECT query functionality (src/sel - sqlite3 3.34.1-1 [buster] - sqlite3 <not-affected> (Introduced in 3.33) [stretch] - sqlite3 <not-affected> (Introduced in 3.33) + - sqlite <not-affected> (Introduced in 3.33) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1924886 NOTE: https://sqlite.org/src/info/30a4c323650cc949 NOTE: Patch: https://github.com/sqlite/sqlite/commit/f39168e468af3b1d6b6d37efdcb081eced6724b2 @@ -180307,6 +180312,7 @@ CVE-2020-35528 CVE-2020-35527 (In SQLite 3.31.1, there is an out of bounds access problem through ALT ...) {DLA-3107-1} - sqlite3 3.32.0-1 + - sqlite <not-affected> (renameTokenCheckAll and/or new memory allocator introduced later) NOTE: https://www.sqlite.org/src/info/c431b3fd8fd0f6a6 NOTE: https://github.com/sqlite/sqlite/commit/0990c415f65d2556a5e4122cbe5727d500411aeb (version-3.32.0) CVE-2020-35526 @@ -180314,6 +180320,7 @@ CVE-2020-35526 CVE-2020-35525 (In SQlite 3.31.1, a potential null pointer derreference was found in t ...) {DLA-3107-1} - sqlite3 3.32.0-1 + - sqlite <not-affected> (Patch code already present / not removed yet) NOTE: https://www.sqlite.org/src/info/a67cf5b7d37d5b14 NOTE: https://github.com/sqlite/sqlite/commit/5f69512404cd2e5153ddf90ea277fbba6dd58ab7 (version-3.32.0) CVE-2020-35524 (A heap-based buffer overflow flaw was found in libtiff in the handling ...) @@ -199091,6 +199098,7 @@ CVE-2020-24737 RESERVED CVE-2020-24736 (Buffer Overflow vulnerability found in SQLite3 v.3.27.1 and before all ...) - sqlite3 3.27.2-1 + - sqlite <not-affected> (window functions not present in v2) NOTE: https://github.com/sqlite/sqlite/commit/f030b376820102ff6cda49565c8b8173b2d44606 (version-3.28.0) NOTE: https://github.com/sqlite/sqlite/commit/7bcb9e51e7dcb38d545e83065d17e669f5b804bf (version-3.27.2) NOTE: https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959 @@ -219761,6 +219769,7 @@ CVE-2020-15358 (In SQLite before 3.32.3, select.c mishandles query-flattener opt [buster] - sqlite3 3.27.2-3+deb10u1 [stretch] - sqlite3 <not-affected> (Vulnerable code introduced in 3.25.0) [jessie] - sqlite3 <not-affected> (Vulnerable code introduced in 3.25.0) + - sqlite <not-affected> (multiSelectOrderBy not present, PoC doesn't crash) NOTE: https://www.sqlite.org/src/info/10fa79d00f8091e5 NOTE: https://www.sqlite.org/src/tktview?name=8f157e8010 CVE-2020-15356 @@ -223997,6 +224006,7 @@ CVE-2020-13871 (SQLite 3.32.2 has a use-after-free in resetAccumulator in select - sqlite3 3.32.2-2 [buster] - sqlite3 <not-affected> (Vulnerability introduced later) [jessie] - sqlite3 <not-affected> (Vulnerable code not present) + - sqlite <not-affected> (Vulnerability introduced later) NOTE: New fix: https://www.sqlite.org/src/info/44a58d6cb135a104 NOTE: Fixed by: https://www.sqlite.org/src/info/79eff1d0383179c4 NOTE: https://www.sqlite.org/src/info/c8d3b9f0a750a529 @@ -224714,6 +224724,7 @@ CVE-2020-13632 (ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL point - sqlite3 3.32.0-1 [buster] - sqlite3 3.27.2-3+deb10u1 [jessie] - sqlite3 <not-affected> (Vulnerable code not present) + - sqlite <not-affected> (FTS (full-text search) modules not present in v2) NOTE: https://bugs.chromium.org/p/chromium/issues/detail?id=1080459 NOTE: https://sqlite.org/src/info/a4dd148928ea65bd NOTE: https://github.com/sqlite/sqlite/commit/219b8e7e7587df8669d96ce867cdd61ca1c05730 @@ -224722,6 +224733,7 @@ CVE-2020-13631 (SQLite before 3.32.0 allows a virtual table to be renamed to the [buster] - sqlite3 <ignored> (Minor issue, too intrusive to backport) [stretch] - sqlite3 <ignored> (Minor issue, too intrusive to backport) [jessie] - sqlite3 <ignored> (Minor issue, too intrusive to backport) + - sqlite <not-affected> (ALTER TABLE not available in v2) NOTE: https://bugs.chromium.org/p/chromium/issues/detail?id=1080459 NOTE: https://sqlite.org/src/info/eca0ba2cf4c0fdf7 CVE-2020-13630 (ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3Ev ...) @@ -224729,6 +224741,7 @@ CVE-2020-13630 (ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in - sqlite3 3.32.0-1 [buster] - sqlite3 3.27.2-3+deb10u1 [jessie] - sqlite3 <not-affected> (Vulnerable code not found) + - sqlite <not-affected> (FTS (full-text search) modules not present in v2) NOTE: https://bugs.chromium.org/p/chromium/issues/detail?id=1080459 NOTE: https://sqlite.org/src/info/0d69f76f0865f962 NOTE: https://github.com/sqlite/sqlite/commit/becd68ba0dac41904aa817d96a67fb4685734b41 @@ -225180,6 +225193,7 @@ CVE-2020-13435 (SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCod [buster] - sqlite3 3.27.2-3+deb10u1 [stretch] - sqlite3 <not-affected> (Vulnerable code introduced later) [jessie] - sqlite3 <not-affected> (Vulnerable code introduced later) + - sqlite <not-affected> (Vulnerable code introduced later, window functions not present in v2) NOTE: https://www.sqlite.org/src/info/7a5279a25c57adf1 NOTE: https://www.sqlite.org/src/info/ad7bb70af9bb68d1 NOTE: https://www.sqlite.org/src/info/572105de1d44bca4 @@ -225187,9 +225201,11 @@ CVE-2020-13434 (SQLite through 3.32.0 has an integer overflow in sqlite3_str_vap {DLA-2340-1 DLA-2221-1} - sqlite3 3.32.1-1 [buster] - sqlite3 3.27.2-3+deb10u1 + - sqlite <removed> NOTE: https://www.sqlite.org/src/info/23439ea582241138 NOTE: https://www.sqlite.org/src/info/d08d3405878d394e NOTE: https://github.com/sqlite/sqlite/commit/dd6c33d372f3b83f4fe57904c2bd5ebba5c38018 + NOTE: Vulnerable code in printf:vxprinf() for sqlite(v2) CVE-2020-13433 (Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php h ...) NOT-FOR-US: Jason2605 AdminPanel CVE-2020-13432 (rejetto HFS (aka HTTP File Server) v2.3m Build #300, when virtual file ...) @@ -230790,6 +230806,7 @@ CVE-2020-11657 RESERVED CVE-2020-11656 (In SQLite through 3.31.1, the ALTER TABLE implementation has a use-aft ...) - sqlite3 3.32.0-1 (unimportant) + - sqlite <not-affected> (ALTER TABLE not available in v2) NOTE: https://www.sqlite.org/cgi/src/tktview?name=4722bdab08cb14 NOTE: https://www.sqlite.org/src/info/d09f8c3621d5f7f8 NOTE: https://www.sqlite.org/src/info/b64674919f673602 @@ -230798,6 +230815,7 @@ CVE-2020-11655 (SQLite through 3.31.1 allows attackers to cause a denial of serv {DLA-2340-1 DLA-2203-1} - sqlite3 3.31.1-5 [buster] - sqlite3 <not-affected> (Introduced/exploitable in 3.30 with 3251a2031bfd29f338a5fda1a08c18878296d354) + - sqlite <not-affected> (window functions not present in v2) NOTE: https://www.sqlite.org/cgi/src/tktview?name=af4556bb5c NOTE: Issue covered before: https://www.sqlite.org/cgi/src/info/712e47714863a8ed NOTE: Fixed by: https://www.sqlite.org/cgi/src/info/4a302b42c7bf5e11 @@ -237329,6 +237347,7 @@ CVE-2020-9327 (In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to tri [buster] - sqlite3 <not-affected> (Vulnerable code not present) [stretch] - sqlite3 <not-affected> (vulnerable code not present) [jessie] - sqlite3 <not-affected> (vulnerable code not present) + - sqlite <not-affected> (Vulnerable code not present) NOTE: https://www.sqlite.org/cgi/src/info/4374860b29383380 NOTE: https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e NOTE: https://www.sqlite.org/cgi/src/info/abc473fb8fb99900 @@ -251540,6 +251559,7 @@ CVE-2019-19924 (SQLite 3.30.1 mishandles certain parser-tree rewriting, related [buster] - sqlite3 <ignored> (Minor issue) [stretch] - sqlite3 <not-affected> (Vulnerable code introduced later) [jessie] - sqlite3 <not-affected> (Vulnerable code introduced later) + - sqlite <not-affected> (Vulnerable code introduced later) NOTE: https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3 CVE-2019-19923 (flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses o ...) {DSA-4638-1} @@ -255558,6 +255578,7 @@ CVE-2019-19645 (alter.c in SQLite through 3.30.1 allows attackers to trigger inf [buster] - sqlite3 <ignored> (Minor issue, too intrusive to backport) [stretch] - sqlite3 <ignored> (Minor issue, too intrusive to backport) [jessie] - sqlite3 <ignored> (Minor issue, too intrusive to backport) + - sqlite <not-affected> (ALTER TABLE not available in v2) NOTE: https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06 CVE-2019-19644 RESERVED @@ -255688,6 +255709,7 @@ CVE-2019-19603 (SQLite 3.30.1 mishandles certain SELECT statements with a nonexi [buster] - sqlite3 <ignored> (Minor issue, too intrusive to backport) [stretch] - sqlite3 <not-affected> (vulnerable code not present) [jessie] - sqlite3 <not-affected> (vulnerable code not present) + - sqlite <not-affected> (Vulnerable code not present) NOTE: https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13 NOTE: read-only shadow tables introduced in https://github.com/sqlite/sqlite/commit/84c501bac16576916840daffb671b72cf1f75625 (3.26) CVE-2019-19601 (OpenDetex 2.8.5 has a Buffer Overflow in TexOpen in detex.l because of ...) @@ -258626,6 +258648,7 @@ CVE-2019-19244 (sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a s - sqlite3 3.30.1+fossil191229-1 (unimportant; bug #946656) [stretch] - sqlite3 <not-affected> (Vulnerable code introduced later) [jessie] - sqlite3 <not-affected> (Vulnerable code, i.e. window functions, not present) + - sqlite <not-affected> (Vulnerable code, i.e. window functions, not present) NOTE: https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348 NOTE: Only triggerable with SQLITE_DEBUG, which Debian builds don't use CVE-2019-19243 @@ -295436,6 +295459,7 @@ CVE-2019-8457 (SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap - sqlite3 3.27.2-3 (bug #929775) [stretch] - sqlite3 <no-dsa> (Minor issue; can be fixed via point release) [jessie] - sqlite3 <no-dsa> (Minor issue) + - sqlite <not-affected> (rtree extension not present in v2) NOTE: Fixed by: https://www.sqlite.org/src/info/90acdbfce9c08858 NOTE: Make the internal dynamic string interface available to extensions: NOTE: https://sqlite.org/src/info/87f261f0cb800b06 @@ -302090,6 +302114,7 @@ CVE-2019-5827 (Integer overflow in SQLite via WebSQL in Google Chrome prior to 7 [stretch] - chromium <end-of-life> (see DSA 4562) - sqlite3 3.27.2-3 [jessie] - sqlite3 <no-dsa> (Minor issue; mainly with inpact in chromium) + - sqlite <not-affected> (Vulnerable code not present / no common vectors with v3) NOTE: https://www.sqlite.org/src/info/07ee06fd390bfebe NOTE: https://www.sqlite.org/src/info/0b6ae032c28e7fe3 CVE-2019-5826 (Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 all ...) @@ -383736,6 +383761,7 @@ CVE-2016-1000245 RESERVED CVE-2017-13685 (The dump_callback function in SQLite 3.20.0 allows remote attackers to ...) - sqlite3 3.20.1-1 (unimportant; bug #873762) + - sqlite <removed> (unimportant) NOTE: https://sqlite.org/src/info/02f0f4c54f2819b3 NOTE: http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html NOTE: Crash in the command-line shell program, not the the core SQLite library. @@ -569039,6 +569065,7 @@ CVE-2010-2444 (parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1 CVE-2010-XXXX [sqlite: info leak] - sqlite3 3.6.21-1 (low; bug #566326) [lenny] - sqlite3 <no-dsa> (Minor information leak) + - sqlite <not-affected> (SQLITE_SECURE_DELETE introduced in v3.3.5) CVE-2010-XXXX [backup-manager: make sure password is not written to world-readable files] - backup-manager 0.7.9-1 (low) [lenny] - backup-manager 0.7.7-2 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/afc2c3682db83440621c28005b856e21ebb51907 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/afc2c3682db83440621c28005b856e21ebb51907 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits