<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for sqlite3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1222-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-17T13:28:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-17T13:28:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-17T13:28:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for sqlite3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for sqlite3 fixes the following issues:

Security issues fixed: 

- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
- CVE-2018-20506: Fixed an integer overflow when FTS3 extension is enabled (bsc#1131576).    

This update was imported from the SUSE:SLE-12-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1222-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsqlite3-0-3.8.10.2-11.3.1">
      <FullProductName ProductID="libsqlite3-0-3.8.10.2-11.3.1">libsqlite3-0-3.8.10.2-11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsqlite3-0-32bit-3.8.10.2-11.3.1">
      <FullProductName ProductID="libsqlite3-0-32bit-3.8.10.2-11.3.1">libsqlite3-0-32bit-3.8.10.2-11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-3.8.10.2-11.3.1">
      <FullProductName ProductID="sqlite3-3.8.10.2-11.3.1">sqlite3-3.8.10.2-11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-devel-3.8.10.2-11.3.1">
      <FullProductName ProductID="sqlite3-devel-3.8.10.2-11.3.1">sqlite3-devel-3.8.10.2-11.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-doc-3.8.10.2-11.3.1">
      <FullProductName ProductID="sqlite3-doc-3.8.10.2-11.3.1">sqlite3-doc-3.8.10.2-11.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsqlite3-0-3.8.10.2-11.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libsqlite3-0-3.8.10.2-11.3.1">libsqlite3-0-3.8.10.2-11.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsqlite3-0-32bit-3.8.10.2-11.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libsqlite3-0-32bit-3.8.10.2-11.3.1">libsqlite3-0-32bit-3.8.10.2-11.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-3.8.10.2-11.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:sqlite3-3.8.10.2-11.3.1">sqlite3-3.8.10.2-11.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-devel-3.8.10.2-11.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:sqlite3-devel-3.8.10.2-11.3.1">sqlite3-devel-3.8.10.2-11.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-doc-3.8.10.2-11.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:sqlite3-doc-3.8.10.2-11.3.1">sqlite3-doc-3.8.10.2-11.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.</Note>
    </Notes>
    <CVE>CVE-2018-20346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libsqlite3-0-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libsqlite3-0-32bit-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-devel-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-doc-3.8.10.2-11.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20346.html</URL>
        <Description>CVE-2018-20346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119687</URL>
        <Description>SUSE Bug 1119687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120335</URL>
        <Description>SUSE Bug 1120335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131576</URL>
        <Description>SUSE Bug 1131576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131918</URL>
        <Description>SUSE Bug 1131918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131919</URL>
        <Description>SUSE Bug 1131919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148893</URL>
        <Description>SUSE Bug 1148893</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.</Note>
    </Notes>
    <CVE>CVE-2018-20506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:libsqlite3-0-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libsqlite3-0-32bit-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-devel-3.8.10.2-11.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:sqlite3-doc-3.8.10.2-11.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20506.html</URL>
        <Description>CVE-2018-20506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131560</URL>
        <Description>SUSE Bug 1131560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131576</URL>
        <Description>SUSE Bug 1131576</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
