All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] package/sqlite: bump version 3.32.3
@ 2020-07-09 21:57 Sam Voss
  2020-07-11 13:24 ` Thomas Petazzoni
  2020-07-20 20:52 ` Peter Korsgaard
  0 siblings, 2 replies; 4+ messages in thread
From: Sam Voss @ 2020-07-09 21:57 UTC (permalink / raw)
  To: buildroot

Fixes the following CVEs:

- CVE-2019-19923 (Fixed in 3.31.0)

SQLite is vulnerable to denial-of-service condition because of a NULL
pointer dereferencing while handling `SELECT DISTINCT`statements.

- CVE-2019-19924 (Fixed in 3.31.0)

The SQLite mishandles certain SQL commands due to improper error
handling by ` sqlite3WindowRewrite() ` function.

- CVE-2020-13435 (Fixed in 3.32.1)

SQLite is vulnerable to denial-of-service (DoS) due to improper handling
of query rewriting. An attacker could exploit this vulnerability by
supplying a system with maliciously crafted input.

- CVE-2020-13632 (Fixed in 3.32.0)

SQLite is vulnerable to denial-of-service (DoS) due to improper pointer
management in the FTS3 virtual table module. An attacker could exploit
this vulnerability by supplying a system with maliciously crafted input.

- CVE-2020-13434 (Fixed in 3.32.1)

SQLite is vulnerable to denial-of-service (DoS) due to improper handling
of floating-point operations. An attacker could exploit this
vulnerability by supplying a system with maliciously crafted input.

- CVE-2020-13871 (Fixed in 3.32.3)

SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c
because the parse tree rewrite for window functions is too late.

- CVE-2020-13630 (Fixed in 3.32.0)

SQLite is vulnerable to denial-of-service (DoS) due to a use after free
issue in the FTS3 virtual table module. An attacker could exploit this
vulnerability by supplying a system with maliciously crafted input.

- CVE-2020-15358 (Fixed in 3.32.3)

SQLite is vulnerable to a heap-based buffer overflow flaw in part of an
optimization feature. An attacker able to issue specially crafted
queries could cause the application to crash, resulting in a
denial-of-service (DoS).

- CVE-2020-9327 (Fixed in 3.32.0)

SQLite is vulnerable to a Null pointer dereference flaw. A remote
attacker able to issue specially crafted SQL statements may be able to
cause a segmentation fault and application crash, resulting in a
denial-of-service (DoS).

- CVE-2019-19645 (Fixed in 3.31.0)

It was discovered that SQLite contains an denial-of-service (DoS)
vulnerability. An attacker could exploit this to trigger an infinite
recursion resulting in excessive resource consumption leading to a DoS
condition.

- CVE-2019-19926 (Fixed in 3.31.0)

The SQLite allows denial-of-service attack due to improper input
validation of user-supplied input.

- CVE-2020-11655 (Fixed in 3.32.0)

SQLite contains a memory corruption vulnerability. Successfully
exploiting this issue may allow attackers to cause a denial-of-service
(DoS). This allows an attacker to cause SQLite to crash by issuing a
crafted SQL query to the database.

- CVE-2019-19925 (Fixed in 3.31.0)

The INSERT statement fails when the zip file path is `NULL`.

- CVE-2019-19242 (Fixed in 3.31.0)

SQLite is vulnerable to a denial-of-service (DoS). An attacker could
exploit this vulnerability by supplying a maliciously crafted query to
cause an application crash.

- CVE-2019-19244 (Fixed in 3.31.0)

SQLite is vulnerable to a denial-of-service. An attacker could exploit
this vulnerability by providing a crafted SELECT statement to the SQL
server, resulting in an application crash.

- CVE-2020-13631 (Fixed in 3.32.0)

SQLite is vulnerable to data manipulation due to improper management of
virtual tables. An attacker could exploit this vulnerability by
supplying a system with maliciously crafted input.

- CVE-2020-11656 (Fixed in 3.32.0)

SQLite contains a Use-After-Free vulnerability. Successfully exploiting
this issue may allow attackers to cause a denial-of-service (DoS). This
allows an attacker to cause SQLite to crash by issuing a crafted SQL
query to the database.

- CVE-2019-19880 (Fixed in 3.31.0)

SQLite is vulnerable to denial-of-service (DoS) due to the mismanagement
of memory resources. A remote attacker could cause a victim's instance
of the application to crash by submitting crafted request that will lead
to the application parsing problematic integer values.

- CVE-2019-20218 (Fixed in 3.31.0)

SQLite is vulnerable to denial-of-service (DoS) due to improper
exception handling which could lead to unwinding of the `WITH` stack
following parsing errors. An attacker could exploit this vulnerability
by supplying a system with maliciously crafted input.

- CVE-2019-19603 (Fixed in 3.31.0)

It was discovered that SQLite contains a denial-of-service (DoS)
vulnerability. An authenticated attacker could exploit this
vulnerability by creating tables with the same name as shadow table
names.

- CVE-2019-19959 (Fixed in 3.31.0)

SQLite is vulnerable to denial-of-service (DoS) due to the mismanagement
of system memory resources. A remote attacker could cause a victim's
instance of the application to crash by causing it to process a SQL
statement that references a maliciously crafted file name.

- CVE-2019-19646 (Fixed in 3.31.0)

SQLite is vulnerable to a denial-of-service (DoS). An attacker could
exploit this vulnerability by supplying malicious SQL in order to crash
the application.

- CVE-2019-19317 (Fixed in 3.31.0)

SQLite contains a denial-of-service (DoS) vulnerability due to incorrect
logic in name lookups. An attacker could exploit this to cause a
application crash.

Signed-off-by: Sam Voss <sam.voss@rockwellcollins.com>
CC: Peter Korsgard <peter@korsgaard.com>

---

Peter: Can this be put onto the 2020.02 LTS as it carries a lot of
security fixes?
---
 package/sqlite/sqlite.hash | 4 ++--
 package/sqlite/sqlite.mk   | 4 ++--
 2 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/package/sqlite/sqlite.hash b/package/sqlite/sqlite.hash
index 1d4bd03eda..4edf84f18b 100644
--- a/package/sqlite/sqlite.hash
+++ b/package/sqlite/sqlite.hash
@@ -1,6 +1,6 @@
 # From https://www.sqlite.org/download.html
-sha1 8383f29d53fa1d4383e4c8eb3e087f2ed940a9e0  sqlite-autoconf-3300100.tar.gz
+sha1 ea14ef2dc4cc7fcbc5ebbb018d3a03faa3a41cb4  sqlite-autoconf-3320300.tar.gz
 # Calculated based on the hash above
-sha256 8c5a50db089bd2a1b08dbc5b00d2027602ca7ff238ba7658fabca454d4298e60  sqlite-autoconf-3300100.tar.gz
+sha256 a31507123c1c2e3a210afec19525fd7b5bb1e19a6a34ae5b998fbd7302568b66  sqlite-autoconf-3320300.tar.gz
 # Locally calculated
 sha256 66e056b6e8687f32af30d5187611b98b12a8f46f07aaf62f43585f276e8f0ac9  tea/license.terms
diff --git a/package/sqlite/sqlite.mk b/package/sqlite/sqlite.mk
index c5cf9607a4..c8b9ba3150 100644
--- a/package/sqlite/sqlite.mk
+++ b/package/sqlite/sqlite.mk
@@ -4,9 +4,9 @@
 #
 ################################################################################
 
-SQLITE_VERSION = 3300100
+SQLITE_VERSION = 3320300
 SQLITE_SOURCE = sqlite-autoconf-$(SQLITE_VERSION).tar.gz
-SQLITE_SITE = https://www.sqlite.org/2019
+SQLITE_SITE = https://www.sqlite.org/2020
 SQLITE_LICENSE = Public domain
 SQLITE_LICENSE_FILES = tea/license.terms
 SQLITE_INSTALL_STAGING = YES
-- 
2.17.1

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/sqlite: bump version 3.32.3
  2020-07-09 21:57 [Buildroot] [PATCH] package/sqlite: bump version 3.32.3 Sam Voss
@ 2020-07-11 13:24 ` Thomas Petazzoni
  2020-07-14 13:47   ` Sam Voss
  2020-07-20 20:52 ` Peter Korsgaard
  1 sibling, 1 reply; 4+ messages in thread
From: Thomas Petazzoni @ 2020-07-11 13:24 UTC (permalink / raw)
  To: buildroot

Hello Sam,

On Thu,  9 Jul 2020 16:57:59 -0500
Sam Voss <sam.voss@rockwellcollins.com> wrote:

> Fixes the following CVEs:

[...]

Thanks, I've applied. However, you should send patches based on master,
not based on 2020.02.x, unless of course they are only applicable to
2020.02.x.

In addition, for version bumps that we know have security fixes, we
like to have the commit title that says "security bump to version
X.Y.Z" or something along those lines.

Thanks!

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/sqlite: bump version 3.32.3
  2020-07-11 13:24 ` Thomas Petazzoni
@ 2020-07-14 13:47   ` Sam Voss
  0 siblings, 0 replies; 4+ messages in thread
From: Sam Voss @ 2020-07-14 13:47 UTC (permalink / raw)
  To: buildroot

Hey Thomas,

On Sat, Jul 11, 2020 at 8:25 AM Thomas Petazzoni
<thomas.petazzoni@bootlin.com> wrote:
>
> Hello Sam,
>
> On Thu,  9 Jul 2020 16:57:59 -0500
> Sam Voss <sam.voss@rockwellcollins.com> wrote:
>
> > Fixes the following CVEs:
>
> [...]
>
> Thanks, I've applied. However, you should send patches based on master,
> not based on 2020.02.x, unless of course they are only applicable to
> 2020.02.x.
>
> In addition, for version bumps that we know have security fixes, we
> like to have the commit title that says "security bump to version
> X.Y.Z" or something along those lines.

Sounds good, I'll make sure to do this in the future.

-- 
Sam Voss | Sr. Software Engineer | Commercial Avionics
COLLINS AEROSPACE
400 Collins Road NE, Cedar Rapids, Iowa 52498, USA
Tel: +1 319 263 4039
sam.voss at collins.com | collinsaerospace.com

CONFIDENTIALITY WARNING: This message may contain proprietary and/or
privileged information of Collins Aerospace and its affiliated
companies. If you are not the intended recipient, please 1) Do not
disclose, copy, distribute or use this message or its contents. 2)
Advise the sender by return email. 3) Delete all copies (including all
attachments) from your computer. Your cooperation is greatly
appreciated.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] package/sqlite: bump version 3.32.3
  2020-07-09 21:57 [Buildroot] [PATCH] package/sqlite: bump version 3.32.3 Sam Voss
  2020-07-11 13:24 ` Thomas Petazzoni
@ 2020-07-20 20:52 ` Peter Korsgaard
  1 sibling, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2020-07-20 20:52 UTC (permalink / raw)
  To: buildroot

>>>>> "Sam" == Sam Voss <sam.voss@rockwellcollins.com> writes:

 > Fixes the following CVEs:
 > - CVE-2019-19923 (Fixed in 3.31.0)

 > SQLite is vulnerable to denial-of-service condition because of a NULL
 > pointer dereferencing while handling `SELECT DISTINCT`statements.

 > - CVE-2019-19924 (Fixed in 3.31.0)

 > The SQLite mishandles certain SQL commands due to improper error
 > handling by ` sqlite3WindowRewrite() ` function.

 > - CVE-2020-13435 (Fixed in 3.32.1)

 > SQLite is vulnerable to denial-of-service (DoS) due to improper handling
 > of query rewriting. An attacker could exploit this vulnerability by
 > supplying a system with maliciously crafted input.

 > - CVE-2020-13632 (Fixed in 3.32.0)

 > SQLite is vulnerable to denial-of-service (DoS) due to improper pointer
 > management in the FTS3 virtual table module. An attacker could exploit
 > this vulnerability by supplying a system with maliciously crafted input.

 > - CVE-2020-13434 (Fixed in 3.32.1)

 > SQLite is vulnerable to denial-of-service (DoS) due to improper handling
 > of floating-point operations. An attacker could exploit this
 > vulnerability by supplying a system with maliciously crafted input.

 > - CVE-2020-13871 (Fixed in 3.32.3)

 > SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c
 > because the parse tree rewrite for window functions is too late.

 > - CVE-2020-13630 (Fixed in 3.32.0)

 > SQLite is vulnerable to denial-of-service (DoS) due to a use after free
 > issue in the FTS3 virtual table module. An attacker could exploit this
 > vulnerability by supplying a system with maliciously crafted input.

 > - CVE-2020-15358 (Fixed in 3.32.3)

 > SQLite is vulnerable to a heap-based buffer overflow flaw in part of an
 > optimization feature. An attacker able to issue specially crafted
 > queries could cause the application to crash, resulting in a
 > denial-of-service (DoS).

 > - CVE-2020-9327 (Fixed in 3.32.0)

 > SQLite is vulnerable to a Null pointer dereference flaw. A remote
 > attacker able to issue specially crafted SQL statements may be able to
 > cause a segmentation fault and application crash, resulting in a
 > denial-of-service (DoS).

 > - CVE-2019-19645 (Fixed in 3.31.0)

 > It was discovered that SQLite contains an denial-of-service (DoS)
 > vulnerability. An attacker could exploit this to trigger an infinite
 > recursion resulting in excessive resource consumption leading to a DoS
 > condition.

 > - CVE-2019-19926 (Fixed in 3.31.0)

 > The SQLite allows denial-of-service attack due to improper input
 > validation of user-supplied input.

 > - CVE-2020-11655 (Fixed in 3.32.0)

 > SQLite contains a memory corruption vulnerability. Successfully
 > exploiting this issue may allow attackers to cause a denial-of-service
 > (DoS). This allows an attacker to cause SQLite to crash by issuing a
 > crafted SQL query to the database.

 > - CVE-2019-19925 (Fixed in 3.31.0)

 > The INSERT statement fails when the zip file path is `NULL`.

 > - CVE-2019-19242 (Fixed in 3.31.0)

 > SQLite is vulnerable to a denial-of-service (DoS). An attacker could
 > exploit this vulnerability by supplying a maliciously crafted query to
 > cause an application crash.

 > - CVE-2019-19244 (Fixed in 3.31.0)

 > SQLite is vulnerable to a denial-of-service. An attacker could exploit
 > this vulnerability by providing a crafted SELECT statement to the SQL
 > server, resulting in an application crash.

 > - CVE-2020-13631 (Fixed in 3.32.0)

 > SQLite is vulnerable to data manipulation due to improper management of
 > virtual tables. An attacker could exploit this vulnerability by
 > supplying a system with maliciously crafted input.

 > - CVE-2020-11656 (Fixed in 3.32.0)

 > SQLite contains a Use-After-Free vulnerability. Successfully exploiting
 > this issue may allow attackers to cause a denial-of-service (DoS). This
 > allows an attacker to cause SQLite to crash by issuing a crafted SQL
 > query to the database.

 > - CVE-2019-19880 (Fixed in 3.31.0)

 > SQLite is vulnerable to denial-of-service (DoS) due to the mismanagement
 > of memory resources. A remote attacker could cause a victim's instance
 > of the application to crash by submitting crafted request that will lead
 > to the application parsing problematic integer values.

 > - CVE-2019-20218 (Fixed in 3.31.0)

 > SQLite is vulnerable to denial-of-service (DoS) due to improper
 > exception handling which could lead to unwinding of the `WITH` stack
 > following parsing errors. An attacker could exploit this vulnerability
 > by supplying a system with maliciously crafted input.

 > - CVE-2019-19603 (Fixed in 3.31.0)

 > It was discovered that SQLite contains a denial-of-service (DoS)
 > vulnerability. An authenticated attacker could exploit this
 > vulnerability by creating tables with the same name as shadow table
 > names.

 > - CVE-2019-19959 (Fixed in 3.31.0)

 > SQLite is vulnerable to denial-of-service (DoS) due to the mismanagement
 > of system memory resources. A remote attacker could cause a victim's
 > instance of the application to crash by causing it to process a SQL
 > statement that references a maliciously crafted file name.

 > - CVE-2019-19646 (Fixed in 3.31.0)

 > SQLite is vulnerable to a denial-of-service (DoS). An attacker could
 > exploit this vulnerability by supplying malicious SQL in order to crash
 > the application.

 > - CVE-2019-19317 (Fixed in 3.31.0)

 > SQLite contains a denial-of-service (DoS) vulnerability due to incorrect
 > logic in name lookups. An attacker could exploit this to cause a
 > application crash.

 > Signed-off-by: Sam Voss <sam.voss@rockwellcollins.com>
 > CC: Peter Korsgard <peter@korsgaard.com>

 > ---

 > Peter: Can this be put onto the 2020.02 LTS as it carries a lot of
 > security fixes?

Committed to 2020.02.x and 2020.05.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2020-07-20 20:52 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-09 21:57 [Buildroot] [PATCH] package/sqlite: bump version 3.32.3 Sam Voss
2020-07-11 13:24 ` Thomas Petazzoni
2020-07-14 13:47   ` Sam Voss
2020-07-20 20:52 ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.