cvrf2cusa/cvrf/2022/cvrf-openEuler-SA-2022-1876.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

107 lines
6.2 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for sqlite is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-1876</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-09-01</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-09-01</InitialReleaseDate>
<CurrentReleaseDate>2022-09-01</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-09-01</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">sqlite security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for sqlite is now available for openEuler-20.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">SQLite is a C-language library that implements a small, fast, self-contained,high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.It also include lemon and sqlite3_analyzer and tcl tools.
Security Fix(es):
An issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode &quot;control-characters&quot; (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later.(CVE-2021-20223)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for sqlite is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">sqlite</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1876</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-20223</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-20223</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="sqlite-devel-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-devel-3.32.3-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="sqlite-debuginfo-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-debuginfo-3.32.3-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="sqlite-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-3.32.3-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="sqlite-debugsource-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-debugsource-3.32.3-5.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="sqlite-help-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-help-3.32.3-5.oe1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="sqlite-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-3.32.3-5.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="sqlite-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-3.32.3-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="sqlite-debuginfo-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-debuginfo-3.32.3-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="sqlite-devel-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-devel-3.32.3-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="sqlite-debugsource-3.32.3-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">sqlite-debugsource-3.32.3-5.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode &quot;control-characters&quot; (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later.</Note>
</Notes>
<ReleaseDate>2022-09-01</ReleaseDate>
<CVE>CVE-2021-20223</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Critical</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>9.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>sqlite security update</Description>
<DATE>2022-09-01</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1876</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>