Bugzilla – Bug 1160309
VUL-1: CVE-2019-19923: sqlite3 : improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer dereference
Last modified: 2021-09-23 20:36:00 UTC
CVE-2019-19923 flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results). References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19923 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19923.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923 https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
It seems that only versions from 3.19 and on are affected. Based on this SLE-15 is tracked as affected. The link for the fix can be found in comment 0
SUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: SUSE MicroOS 5.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Server 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Retail Branch Server 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Proxy 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server for SAP 15 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): sqlite3-3.36.0-3.12.1 SUSE Enterprise Storage 6 (src): sqlite3-3.36.0-3.12.1 SUSE CaaS Platform 4.0 (src): sqlite3-3.36.0-3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: openSUSE Leap 15.3 (src): sqlite3-3.36.0-3.12.1
openSUSE-SU-2021:1058-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: openSUSE Leap 15.2 (src): sqlite3-3.36.0-lp152.4.3.1
SUSE-SU-2021:3215-1: An update that fixes 28 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2016-6153,CVE-2017-10989,CVE-2017-2518,CVE-2018-20346,CVE-2018-8740,CVE-2019-16168,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2019-8457,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud Crowbar 8 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud 9 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud 8 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP5 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): sqlite3-3.36.0-9.18.1 HPE Helion Openstack 8 (src): sqlite3-3.36.0-9.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.