An update for sqlite is now available for openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1877 Final 1.0 1.0 2022-09-01 Initial 2022-09-01 2022-09-01 openEuler SA Tool V1.0 2022-09-01 sqlite security update An update for sqlite is now available for openEuler-20.03-LTS-SP3. SQLite is a C-language library that implements a small, fast, self-contained,high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.It also include lemon and sqlite3_analyzer and tcl tools. Security Fix(es): An issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode "control-characters" (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later.(CVE-2021-20223) An update for sqlite is now available for openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Critical sqlite https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1877 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-20223 https://nvd.nist.gov/vuln/detail/CVE-2021-20223 openEuler-20.03-LTS-SP3 sqlite-devel-3.32.3-5.oe1.aarch64.rpm sqlite-3.32.3-5.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-5.oe1.aarch64.rpm sqlite-debugsource-3.32.3-5.oe1.aarch64.rpm sqlite-help-3.32.3-5.oe1.noarch.rpm sqlite-3.32.3-5.oe1.src.rpm sqlite-devel-3.32.3-5.oe1.x86_64.rpm sqlite-debuginfo-3.32.3-5.oe1.x86_64.rpm sqlite-debugsource-3.32.3-5.oe1.x86_64.rpm sqlite-3.32.3-5.oe1.x86_64.rpm An issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode "control-characters" (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later. 2022-09-01 CVE-2021-20223 openEuler-20.03-LTS-SP3 Critical 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H sqlite security update 2022-09-01 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1877