An update for sqlite is now available for openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1252 Final 1.0 1.0 2021-07-03 Initial 2021-07-03 2021-07-03 openEuler SA Tool V1.0 2021-07-03 sqlite security update An update for sqlite is now available for openEuler-20.03-LTS-SP1. SQLite is a C-language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day. It also include lemon and sqlite3_analyzer and tcl tools. Security Fix(es): A flaw was found in SQLite s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.(CVE-2021-20227) An update for sqlite is now available for openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium sqlite https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1252 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-20227 https://nvd.nist.gov/vuln/detail/CVE-2021-20227 openEuler-20.03-LTS-SP1 sqlite-3.32.3-3.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-3.oe1.aarch64.rpm sqlite-debugsource-3.32.3-3.oe1.aarch64.rpm sqlite-devel-3.32.3-3.oe1.aarch64.rpm sqlite-help-3.32.3-3.oe1.noarch.rpm sqlite-3.32.3-3.oe1.src.rpm sqlite-debuginfo-3.32.3-3.oe1.x86_64.rpm sqlite-devel-3.32.3-3.oe1.x86_64.rpm sqlite-3.32.3-3.oe1.x86_64.rpm sqlite-debugsource-3.32.3-3.oe1.x86_64.rpm A flaw was found in SQLite s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability. 2021-07-03 CVE-2021-20227 openEuler-20.03-LTS-SP1 Medium 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H sqlite security update 2021-07-03 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1252