An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1063 Final 1.0 1.0 2024-01-12 Initial 2024-01-12 2024-01-12 openEuler SA Tool V1.0 2024-01-12 sqlite security update An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3. SQLite is a C-language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.It also include lemon and sqlite3_analyzer and tcl tools. Security Fix(es): A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.(CVE-2023-7104) An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High sqlite https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1063 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-7104 https://nvd.nist.gov/vuln/detail/CVE-2023-7104 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 openEuler-22.03-LTS-SP3 sqlite-devel-3.32.3-7.oe1.aarch64.rpm sqlite-3.32.3-7.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-7.oe1.aarch64.rpm sqlite-debugsource-3.32.3-7.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-7.oe2003sp4.aarch64.rpm sqlite-3.32.3-7.oe2003sp4.aarch64.rpm sqlite-devel-3.32.3-7.oe2003sp4.aarch64.rpm sqlite-debugsource-3.32.3-7.oe2003sp4.aarch64.rpm sqlite-debuginfo-3.37.2-7.oe2203.aarch64.rpm sqlite-devel-3.37.2-7.oe2203.aarch64.rpm sqlite-debugsource-3.37.2-7.oe2203.aarch64.rpm sqlite-3.37.2-7.oe2203.aarch64.rpm sqlite-3.37.2-7.oe2203sp1.aarch64.rpm sqlite-devel-3.37.2-7.oe2203sp1.aarch64.rpm sqlite-debugsource-3.37.2-7.oe2203sp1.aarch64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp1.aarch64.rpm sqlite-3.37.2-7.oe2203sp2.aarch64.rpm sqlite-devel-3.37.2-7.oe2203sp2.aarch64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp2.aarch64.rpm sqlite-debugsource-3.37.2-7.oe2203sp2.aarch64.rpm sqlite-3.37.2-7.oe2203sp3.aarch64.rpm sqlite-debugsource-3.37.2-7.oe2203sp3.aarch64.rpm sqlite-devel-3.37.2-7.oe2203sp3.aarch64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp3.aarch64.rpm sqlite-help-3.32.3-7.oe1.noarch.rpm sqlite-help-3.32.3-7.oe2003sp4.noarch.rpm sqlite-help-3.37.2-7.oe2203.noarch.rpm sqlite-help-3.37.2-7.oe2203sp1.noarch.rpm sqlite-help-3.37.2-7.oe2203sp2.noarch.rpm sqlite-help-3.37.2-7.oe2203sp3.noarch.rpm sqlite-3.32.3-7.oe1.src.rpm sqlite-3.32.3-7.oe2003sp4.src.rpm sqlite-3.37.2-7.oe2203.src.rpm sqlite-3.37.2-7.oe2203sp1.src.rpm sqlite-3.37.2-7.oe2203sp2.src.rpm sqlite-3.37.2-7.oe2203sp3.src.rpm sqlite-debuginfo-3.32.3-7.oe1.x86_64.rpm sqlite-debugsource-3.32.3-7.oe1.x86_64.rpm sqlite-devel-3.32.3-7.oe1.x86_64.rpm sqlite-3.32.3-7.oe1.x86_64.rpm sqlite-3.32.3-7.oe2003sp4.x86_64.rpm sqlite-debugsource-3.32.3-7.oe2003sp4.x86_64.rpm sqlite-debuginfo-3.32.3-7.oe2003sp4.x86_64.rpm sqlite-devel-3.32.3-7.oe2003sp4.x86_64.rpm sqlite-3.37.2-7.oe2203.x86_64.rpm sqlite-debuginfo-3.37.2-7.oe2203.x86_64.rpm sqlite-devel-3.37.2-7.oe2203.x86_64.rpm sqlite-debugsource-3.37.2-7.oe2203.x86_64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp1.x86_64.rpm sqlite-devel-3.37.2-7.oe2203sp1.x86_64.rpm sqlite-3.37.2-7.oe2203sp1.x86_64.rpm sqlite-debugsource-3.37.2-7.oe2203sp1.x86_64.rpm sqlite-debugsource-3.37.2-7.oe2203sp2.x86_64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp2.x86_64.rpm sqlite-devel-3.37.2-7.oe2203sp2.x86_64.rpm sqlite-3.37.2-7.oe2203sp2.x86_64.rpm sqlite-3.37.2-7.oe2203sp3.x86_64.rpm sqlite-debugsource-3.37.2-7.oe2203sp3.x86_64.rpm sqlite-devel-3.37.2-7.oe2203sp3.x86_64.rpm sqlite-debuginfo-3.37.2-7.oe2203sp3.x86_64.rpm A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. 2024-01-12 CVE-2023-7104 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP2 openEuler-22.03-LTS-SP3 High 7.3 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H sqlite security update 2024-01-12 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1063