<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for sqlite3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1058-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-19T21:03:43Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-19T21:03:43Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-19T21:03:43Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for sqlite3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for sqlite3 fixes the following issues:

- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
  optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling  of  certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling  of certain errors during parsing  multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
  (bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
  a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
  columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1058</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1058-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1157818</URL>
      <Description>SUSE Bug 1157818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158812</URL>
      <Description>SUSE Bug 1158812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158958</URL>
      <Description>SUSE Bug 1158958</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158959</URL>
      <Description>SUSE Bug 1158959</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1158960</URL>
      <Description>SUSE Bug 1158960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159491</URL>
      <Description>SUSE Bug 1159491</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159715</URL>
      <Description>SUSE Bug 1159715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159847</URL>
      <Description>SUSE Bug 1159847</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159850</URL>
      <Description>SUSE Bug 1159850</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160309</URL>
      <Description>SUSE Bug 1160309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160438</URL>
      <Description>SUSE Bug 1160438</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1160439</URL>
      <Description>SUSE Bug 1160439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1164719</URL>
      <Description>SUSE Bug 1164719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172091</URL>
      <Description>SUSE Bug 1172091</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172115</URL>
      <Description>SUSE Bug 1172115</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172234</URL>
      <Description>SUSE Bug 1172234</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172236</URL>
      <Description>SUSE Bug 1172236</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1172240</URL>
      <Description>SUSE Bug 1172240</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1173641</URL>
      <Description>SUSE Bug 1173641</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/928700</URL>
      <Description>SUSE Bug 928700</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/928701</URL>
      <Description>SUSE Bug 928701</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3414/</URL>
      <Description>SUSE CVE CVE-2015-3414 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3415/</URL>
      <Description>SUSE CVE CVE-2015-3415 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19244/</URL>
      <Description>SUSE CVE CVE-2019-19244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19317/</URL>
      <Description>SUSE CVE CVE-2019-19317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19603/</URL>
      <Description>SUSE CVE CVE-2019-19603 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19645/</URL>
      <Description>SUSE CVE CVE-2019-19645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19646/</URL>
      <Description>SUSE CVE CVE-2019-19646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19880/</URL>
      <Description>SUSE CVE CVE-2019-19880 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19923/</URL>
      <Description>SUSE CVE CVE-2019-19923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19924/</URL>
      <Description>SUSE CVE CVE-2019-19924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19925/</URL>
      <Description>SUSE CVE CVE-2019-19925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19926/</URL>
      <Description>SUSE CVE CVE-2019-19926 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19959/</URL>
      <Description>SUSE CVE CVE-2019-19959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20218/</URL>
      <Description>SUSE CVE CVE-2019-20218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13434/</URL>
      <Description>SUSE CVE CVE-2020-13434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13435/</URL>
      <Description>SUSE CVE CVE-2020-13435 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13630/</URL>
      <Description>SUSE CVE CVE-2020-13630 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13631/</URL>
      <Description>SUSE CVE CVE-2020-13631 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13632/</URL>
      <Description>SUSE CVE CVE-2020-13632 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15358/</URL>
      <Description>SUSE CVE CVE-2020-15358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-9327/</URL>
      <Description>SUSE CVE CVE-2020-9327 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libsqlite3-0-3.36.0-lp152.4.3.1">
      <FullProductName ProductID="libsqlite3-0-3.36.0-lp152.4.3.1">libsqlite3-0-3.36.0-lp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsqlite3-0-32bit-3.36.0-lp152.4.3.1">
      <FullProductName ProductID="libsqlite3-0-32bit-3.36.0-lp152.4.3.1">libsqlite3-0-32bit-3.36.0-lp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-3.36.0-lp152.4.3.1">
      <FullProductName ProductID="sqlite3-3.36.0-lp152.4.3.1">sqlite3-3.36.0-lp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-devel-3.36.0-lp152.4.3.1">
      <FullProductName ProductID="sqlite3-devel-3.36.0-lp152.4.3.1">sqlite3-devel-3.36.0-lp152.4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sqlite3-doc-3.36.0-lp152.4.3.1">
      <FullProductName ProductID="sqlite3-doc-3.36.0-lp152.4.3.1">sqlite3-doc-3.36.0-lp152.4.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libsqlite3-0-3.36.0-lp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1">libsqlite3-0-3.36.0-lp152.4.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsqlite3-0-32bit-3.36.0-lp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1">libsqlite3-0-32bit-3.36.0-lp152.4.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-3.36.0-lp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1">sqlite3-3.36.0-lp152.4.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-devel-3.36.0-lp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1">sqlite3-devel-3.36.0-lp152.4.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="sqlite3-doc-3.36.0-lp152.4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1">sqlite3-doc-3.36.0-lp152.4.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.</Note>
    </Notes>
    <CVE>CVE-2015-3414</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3414.html</URL>
        <Description>CVE-2015-3414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085790</URL>
        <Description>SUSE Bug 1085790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190372</URL>
        <Description>SUSE Bug 1190372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193078</URL>
        <Description>SUSE Bug 1193078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928700</URL>
        <Description>SUSE Bug 928700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928701</URL>
        <Description>SUSE Bug 928701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928702</URL>
        <Description>SUSE Bug 928702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.</Note>
    </Notes>
    <CVE>CVE-2015-3415</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3415.html</URL>
        <Description>CVE-2015-3415</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190372</URL>
        <Description>SUSE Bug 1190372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928700</URL>
        <Description>SUSE Bug 928700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928701</URL>
        <Description>SUSE Bug 928701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/928702</URL>
        <Description>SUSE Bug 928702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.</Note>
    </Notes>
    <CVE>CVE-2019-19244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19244.html</URL>
        <Description>CVE-2019-19244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157817</URL>
        <Description>SUSE Bug 1157817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157818</URL>
        <Description>SUSE Bug 1157818</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2019-19317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19317.html</URL>
        <Description>CVE-2019-19317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158812</URL>
        <Description>SUSE Bug 1158812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196773</URL>
        <Description>SUSE Bug 1196773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196775</URL>
        <Description>SUSE Bug 1196775</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.</Note>
    </Notes>
    <CVE>CVE-2019-19603</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19603.html</URL>
        <Description>CVE-2019-19603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158960</URL>
        <Description>SUSE Bug 1158960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193078</URL>
        <Description>SUSE Bug 1193078</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.</Note>
    </Notes>
    <CVE>CVE-2019-19645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19645.html</URL>
        <Description>CVE-2019-19645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158958</URL>
        <Description>SUSE Bug 1158958</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.</Note>
    </Notes>
    <CVE>CVE-2019-19646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19646.html</URL>
        <Description>CVE-2019-19646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158959</URL>
        <Description>SUSE Bug 1158959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.</Note>
    </Notes>
    <CVE>CVE-2019-19880</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19880.html</URL>
        <Description>CVE-2019-19880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159491</URL>
        <Description>SUSE Bug 1159491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159715</URL>
        <Description>SUSE Bug 1159715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162833</URL>
        <Description>SUSE Bug 1162833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).</Note>
    </Notes>
    <CVE>CVE-2019-19923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19923.html</URL>
        <Description>CVE-2019-19923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160309</URL>
        <Description>SUSE Bug 1160309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162833</URL>
        <Description>SUSE Bug 1162833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.</Note>
    </Notes>
    <CVE>CVE-2019-19924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19924.html</URL>
        <Description>CVE-2019-19924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159850</URL>
        <Description>SUSE Bug 1159850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2019-19925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19925.html</URL>
        <Description>CVE-2019-19925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159847</URL>
        <Description>SUSE Bug 1159847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162833</URL>
        <Description>SUSE Bug 1162833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.</Note>
    </Notes>
    <CVE>CVE-2019-19926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19926.html</URL>
        <Description>CVE-2019-19926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159491</URL>
        <Description>SUSE Bug 1159491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159715</URL>
        <Description>SUSE Bug 1159715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162833</URL>
        <Description>SUSE Bug 1162833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.</Note>
    </Notes>
    <CVE>CVE-2019-19959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19959.html</URL>
        <Description>CVE-2019-19959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160438</URL>
        <Description>SUSE Bug 1160438</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.</Note>
    </Notes>
    <CVE>CVE-2019-20218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20218.html</URL>
        <Description>CVE-2019-20218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160439</URL>
        <Description>SUSE Bug 1160439</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189840</URL>
        <Description>SUSE Bug 1189840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190372</URL>
        <Description>SUSE Bug 1190372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192495</URL>
        <Description>SUSE Bug 1192495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193078</URL>
        <Description>SUSE Bug 1193078</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.</Note>
    </Notes>
    <CVE>CVE-2020-13434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13434.html</URL>
        <Description>CVE-2020-13434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172115</URL>
        <Description>SUSE Bug 1172115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.</Note>
    </Notes>
    <CVE>CVE-2020-13435</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13435.html</URL>
        <Description>CVE-2020-13435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172091</URL>
        <Description>SUSE Bug 1172091</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.</Note>
    </Notes>
    <CVE>CVE-2020-13630</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13630.html</URL>
        <Description>CVE-2020-13630</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172234</URL>
        <Description>SUSE Bug 1172234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.</Note>
    </Notes>
    <CVE>CVE-2020-13631</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13631.html</URL>
        <Description>CVE-2020-13631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172236</URL>
        <Description>SUSE Bug 1172236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.</Note>
    </Notes>
    <CVE>CVE-2020-13632</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13632.html</URL>
        <Description>CVE-2020-13632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172240</URL>
        <Description>SUSE Bug 1172240</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.</Note>
    </Notes>
    <CVE>CVE-2020-15358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15358.html</URL>
        <Description>CVE-2020-15358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173641</URL>
        <Description>SUSE Bug 1173641</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.</Note>
    </Notes>
    <CVE>CVE-2020-9327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libsqlite3-0-32bit-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-devel-3.36.0-lp152.4.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:sqlite3-doc-3.36.0-lp152.4.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-9327.html</URL>
        <Description>CVE-2020-9327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1164719</URL>
        <Description>SUSE Bug 1164719</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
