==========================================================================
Ubuntu Security Notice USN-5615-3
June 27, 2024

sqlite3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

SQLite could be made to crash or execute arbitrary code.

Software Description:
- sqlite3: C library that implements an SQL database engine

Details:

USN-5615-1 fixed several vulnerabilities in SQLite. This update provides
the corresponding fix for CVE-2020-35525 for Ubuntu 14.04 LTS.

Original advisory details:

 It was discovered that SQLite incorrectly handled INTERSEC query
 processing. An attacker could use this issue to cause SQLite to crash,
 resulting in a denial of service, or possibly execute arbitrary code.
 (CVE-2020-35525)

 It was discovered that SQLite incorrectly handled ALTER TABLE for views
 that have a nested FROM clause.  An attacker could use this issue to cause
 SQLite to crash, resulting in a denial of service, or possibly execute
 arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS.
 (CVE-2020-35527)

 It was discovered that SQLite incorrectly handled embedded null characters
 when tokenizing certain unicode strings. This issue could result in
 incorrect results. This issue only affected Ubuntu 20.04 LTS.
 (CVE-2021-20223)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
  libsqlite3-0                    3.8.2-1ubuntu2.2+esm4
                                  Available with Ubuntu Pro
  sqlite3                         3.8.2-1ubuntu2.2+esm4
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5615-3
  https://ubuntu.com/security/notices/USN-5615-1
  CVE-2020-35525

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature



Reply via email to