Bugzilla – Bug 1172091
VUL-0: CVE-2020-13435: sqlite3: Segfault in sqlite3ExprCodeTarget
Last modified: 2022-06-10 10:37:17 UTC
Segfault in sqlite3ExprCodeTarget From https://www.sqlite.org/releaselog/3_32_1.html > Fix two long-standing bugs that allow malicious SQL statements to crash the process that is running SQLite. From https://www.sqlite.org/src/info/7a5279a25c57adf1 > POC: > --- > CREATE TABLE a(c UNIQUE); > SELECT a.c FROM a JOIN a b ON 3 = a.c NATURAL JOIN a WHERE a.c IN((SELECT(SELECT coalesce(lead(2) OVER(), > SUM(c))) FROM a d WHERE a.c)); This might be minor due to the fact that most applications using sqlite will not allow the full SQL statement to be supplied by the user.
This is an autogenerated message for OBS integration: This bug (1172091) was mentioned in https://build.opensuse.org/request/show/808973 Factory / sqlite3
Tracked SLE15 as affected. To reproduce the issue simply run: CREATE TABLE a(c UNIQUE); SELECT a.c FROM a JOIN a b ON 3 = a.c NATURAL JOIN a WHERE a.c IN((SELECT(SELECT coalesce(lead(2) OVER(), SUM(c))) FROM a d WHERE a.c)); this will produce a segmentation fault. OUTPUT from LEAP 15.1: ==25350== Invalid read of size 8 ==25350== at 0x4EBF813: sqlite3ColumnsFromExprList.isra.784 (sqlite3.c:126599) ==25350== by 0x4EBF8B7: sqlite3ExpandSubquery (sqlite3.c:129418) ==25350== by 0x4EBFDFE: sqlite3WindowRewrite (sqlite3.c:146388) ==25350== by 0x4EBFDFE: sqlite3Select (sqlite3.c:130283) ==25350== by 0x4EC3054: sqlite3CodeSubselect (sqlite3.c:99820) ==25350== by 0x4EC5E72: sqlite3ExprCodeTarget (sqlite3.c:100770) ==25350== by 0x4EC72A3: sqlite3ExprCodeExprList (sqlite3.c:101202) ==25350== by 0x4EC805C: innerLoopLoadRow (sqlite3.c:125174) ==25350== by 0x4EC805C: selectInnerLoop (sqlite3.c:125626) ==25350== by 0x4EC1F9A: sqlite3Select (sqlite3.c:131198) ==25350== by 0x4EC3054: sqlite3CodeSubselect (sqlite3.c:99820) ==25350== by 0x4EC5E72: sqlite3ExprCodeTarget (sqlite3.c:100770) ==25350== by 0x4ECB588: codeEqualityTerm (sqlite3.c:136650) ==25350== by 0x4ECC95B: codeAllEqualityTerms (sqlite3.c:136871) ==25350== by 0x4ECC95B: sqlite3WhereCodeOneLoopStart (sqlite3.c:137778) ==25350== by 0x4ECC95B: sqlite3WhereBegin (sqlite3.c:145131) ==25350== Address 0x8 is not stack'd, malloc'd or (recently) free'd
SUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: SUSE MicroOS 5.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Server 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Retail Branch Server 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Manager Proxy 4.0 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server for SAP 15 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Server 15-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): sqlite3-3.36.0-3.12.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): sqlite3-3.36.0-3.12.1 SUSE Enterprise Storage 6 (src): sqlite3-3.36.0-3.12.1 SUSE CaaS Platform 4.0 (src): sqlite3-3.36.0-3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: openSUSE Leap 15.3 (src): sqlite3-3.36.0-3.12.1
openSUSE-SU-2021:1058-1: An update that fixes 21 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: openSUSE Leap 15.2 (src): sqlite3-3.36.0-lp152.4.3.1
SUSE-SU-2021:3215-1: An update that fixes 28 vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701 CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2016-6153,CVE-2017-10989,CVE-2017-2518,CVE-2018-20346,CVE-2018-8740,CVE-2019-16168,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2019-8457,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 JIRA References: SLE-16032 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud Crowbar 8 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud 9 (src): sqlite3-3.36.0-9.18.1 SUSE OpenStack Cloud 8 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP5 (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): sqlite3-3.36.0-9.18.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): sqlite3-3.36.0-9.18.1 HPE Helion Openstack 8 (src): sqlite3-3.36.0-9.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.