{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for sqlite3","title":"Title of the patch"},{"category":"description","text":"This update for sqlite3 fixes the following issues:\n\n- Update to version 3.36.0\n- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener\n  optimization (bsc#1173641)\n- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in\n  isAuxiliaryVtabOperator (bsc#1164719)\n- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)\n- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\\0' input (bsc#1160438)\n- CVE-2019-19923: improper handling  of  certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer\n  dereference (bsc#1160309)\n- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)\n- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)\n- CVE-2019-19926: improper handling  of certain errors during parsing  multiSelect in select.c (bsc#1159715)\n- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference\n  (bsc#1159491)\n- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with\n  a shadow table name (bsc#1158960)\n- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated\n  columns (bsc#1158959)\n- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views\n  in conjunction with ALTER TABLE statements (bsc#1158958)\n- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,\n  which allows attackers to cause a denial of service (bsc#1158812)\n- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a\n  sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)\n- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)\n- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)\n- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)\n- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow\n- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)\n- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)\n- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-SLE-15.3-2021-2320","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2320-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2021:2320-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2021:2320-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/"},{"category":"self","summary":"SUSE Bug 1157818","url":"https://bugzilla.suse.com/1157818"},{"category":"self","summary":"SUSE Bug 1158812","url":"https://bugzilla.suse.com/1158812"},{"category":"self","summary":"SUSE Bug 1158958","url":"https://bugzilla.suse.com/1158958"},{"category":"self","summary":"SUSE Bug 1158959","url":"https://bugzilla.suse.com/1158959"},{"category":"self","summary":"SUSE Bug 1158960","url":"https://bugzilla.suse.com/1158960"},{"category":"self","summary":"SUSE Bug 1159491","url":"https://bugzilla.suse.com/1159491"},{"category":"self","summary":"SUSE Bug 1159715","url":"https://bugzilla.suse.com/1159715"},{"category":"self","summary":"SUSE Bug 1159847","url":"https://bugzilla.suse.com/1159847"},{"category":"self","summary":"SUSE Bug 1159850","url":"https://bugzilla.suse.com/1159850"},{"category":"self","summary":"SUSE Bug 1160309","url":"https://bugzilla.suse.com/1160309"},{"category":"self","summary":"SUSE Bug 1160438","url":"https://bugzilla.suse.com/1160438"},{"category":"self","summary":"SUSE Bug 1160439","url":"https://bugzilla.suse.com/1160439"},{"category":"self","summary":"SUSE Bug 1164719","url":"https://bugzilla.suse.com/1164719"},{"category":"self","summary":"SUSE Bug 1172091","url":"https://bugzilla.suse.com/1172091"},{"category":"self","summary":"SUSE Bug 1172115","url":"https://bugzilla.suse.com/1172115"},{"category":"self","summary":"SUSE Bug 1172234","url":"https://bugzilla.suse.com/1172234"},{"category":"self","summary":"SUSE Bug 1172236","url":"https://bugzilla.suse.com/1172236"},{"category":"self","summary":"SUSE Bug 1172240","url":"https://bugzilla.suse.com/1172240"},{"category":"self","summary":"SUSE Bug 1173641","url":"https://bugzilla.suse.com/1173641"},{"category":"self","summary":"SUSE Bug 928700","url":"https://bugzilla.suse.com/928700"},{"category":"self","summary":"SUSE Bug 928701","url":"https://bugzilla.suse.com/928701"},{"category":"self","summary":"SUSE CVE CVE-2015-3414 page","url":"https://www.suse.com/security/cve/CVE-2015-3414/"},{"category":"self","summary":"SUSE CVE CVE-2015-3415 page","url":"https://www.suse.com/security/cve/CVE-2015-3415/"},{"category":"self","summary":"SUSE CVE CVE-2019-19244 page","url":"https://www.suse.com/security/cve/CVE-2019-19244/"},{"category":"self","summary":"SUSE CVE CVE-2019-19317 page","url":"https://www.suse.com/security/cve/CVE-2019-19317/"},{"category":"self","summary":"SUSE CVE CVE-2019-19603 page","url":"https://www.suse.com/security/cve/CVE-2019-19603/"},{"category":"self","summary":"SUSE CVE CVE-2019-19645 page","url":"https://www.suse.com/security/cve/CVE-2019-19645/"},{"category":"self","summary":"SUSE CVE CVE-2019-19646 page","url":"https://www.suse.com/security/cve/CVE-2019-19646/"},{"category":"self","summary":"SUSE CVE CVE-2019-19880 page","url":"https://www.suse.com/security/cve/CVE-2019-19880/"},{"category":"self","summary":"SUSE CVE CVE-2019-19923 page","url":"https://www.suse.com/security/cve/CVE-2019-19923/"},{"category":"self","summary":"SUSE CVE CVE-2019-19924 page","url":"https://www.suse.com/security/cve/CVE-2019-19924/"},{"category":"self","summary":"SUSE CVE CVE-2019-19925 page","url":"https://www.suse.com/security/cve/CVE-2019-19925/"},{"category":"self","summary":"SUSE CVE CVE-2019-19926 page","url":"https://www.suse.com/security/cve/CVE-2019-19926/"},{"category":"self","summary":"SUSE CVE CVE-2019-19959 page","url":"https://www.suse.com/security/cve/CVE-2019-19959/"},{"category":"self","summary":"SUSE CVE CVE-2019-20218 page","url":"https://www.suse.com/security/cve/CVE-2019-20218/"},{"category":"self","summary":"SUSE CVE CVE-2020-13434 page","url":"https://www.suse.com/security/cve/CVE-2020-13434/"},{"category":"self","summary":"SUSE CVE CVE-2020-13435 page","url":"https://www.suse.com/security/cve/CVE-2020-13435/"},{"category":"self","summary":"SUSE CVE CVE-2020-13630 page","url":"https://www.suse.com/security/cve/CVE-2020-13630/"},{"category":"self","summary":"SUSE CVE CVE-2020-13631 page","url":"https://www.suse.com/security/cve/CVE-2020-13631/"},{"category":"self","summary":"SUSE CVE CVE-2020-13632 page","url":"https://www.suse.com/security/cve/CVE-2020-13632/"},{"category":"self","summary":"SUSE CVE CVE-2020-15358 page","url":"https://www.suse.com/security/cve/CVE-2020-15358/"},{"category":"self","summary":"SUSE CVE CVE-2020-9327 page","url":"https://www.suse.com/security/cve/CVE-2020-9327/"}],"title":"Security update for sqlite3","tracking":{"current_release_date":"2021-07-14T15:01:28Z","generator":{"date":"2021-07-14T15:01:28Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2021:2320-1","initial_release_date":"2021-07-14T15:01:28Z","revision_history":[{"date":"2021-07-14T15:01:28Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libsqlite3-0-3.36.0-3.12.1.aarch64","product":{"name":"libsqlite3-0-3.36.0-3.12.1.aarch64","product_id":"libsqlite3-0-3.36.0-3.12.1.aarch64"}},{"category":"product_version","name":"sqlite3-3.36.0-3.12.1.aarch64","product":{"name":"sqlite3-3.36.0-3.12.1.aarch64","product_id":"sqlite3-3.36.0-3.12.1.aarch64"}},{"category":"product_version","name":"sqlite3-devel-3.36.0-3.12.1.aarch64","product":{"name":"sqlite3-devel-3.36.0-3.12.1.aarch64","product_id":"sqlite3-devel-3.36.0-3.12.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"sqlite3-doc-3.36.0-3.12.1.noarch","product":{"name":"sqlite3-doc-3.36.0-3.12.1.noarch","product_id":"sqlite3-doc-3.36.0-3.12.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"libsqlite3-0-3.36.0-3.12.1.ppc64le","product":{"name":"libsqlite3-0-3.36.0-3.12.1.ppc64le","product_id":"libsqlite3-0-3.36.0-3.12.1.ppc64le"}},{"category":"product_version","name":"sqlite3-3.36.0-3.12.1.ppc64le","product":{"name":"sqlite3-3.36.0-3.12.1.ppc64le","product_id":"sqlite3-3.36.0-3.12.1.ppc64le"}},{"category":"product_version","name":"sqlite3-devel-3.36.0-3.12.1.ppc64le","product":{"name":"sqlite3-devel-3.36.0-3.12.1.ppc64le","product_id":"sqlite3-devel-3.36.0-3.12.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"libsqlite3-0-3.36.0-3.12.1.s390x","product":{"name":"libsqlite3-0-3.36.0-3.12.1.s390x","product_id":"libsqlite3-0-3.36.0-3.12.1.s390x"}},{"category":"product_version","name":"sqlite3-3.36.0-3.12.1.s390x","product":{"name":"sqlite3-3.36.0-3.12.1.s390x","product_id":"sqlite3-3.36.0-3.12.1.s390x"}},{"category":"product_version","name":"sqlite3-devel-3.36.0-3.12.1.s390x","product":{"name":"sqlite3-devel-3.36.0-3.12.1.s390x","product_id":"sqlite3-devel-3.36.0-3.12.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"libsqlite3-0-3.36.0-3.12.1.x86_64","product":{"name":"libsqlite3-0-3.36.0-3.12.1.x86_64","product_id":"libsqlite3-0-3.36.0-3.12.1.x86_64"}},{"category":"product_version","name":"libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","product":{"name":"libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","product_id":"libsqlite3-0-32bit-3.36.0-3.12.1.x86_64"}},{"category":"product_version","name":"sqlite3-3.36.0-3.12.1.x86_64","product":{"name":"sqlite3-3.36.0-3.12.1.x86_64","product_id":"sqlite3-3.36.0-3.12.1.x86_64"}},{"category":"product_version","name":"sqlite3-devel-3.36.0-3.12.1.x86_64","product":{"name":"sqlite3-devel-3.36.0-3.12.1.x86_64","product_id":"sqlite3-devel-3.36.0-3.12.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Leap 15.3","product":{"name":"openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.3"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsqlite3-0-3.36.0-3.12.1.aarch64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64"},"product_reference":"libsqlite3-0-3.36.0-3.12.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"libsqlite3-0-3.36.0-3.12.1.ppc64le as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le"},"product_reference":"libsqlite3-0-3.36.0-3.12.1.ppc64le","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"libsqlite3-0-3.36.0-3.12.1.s390x as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x"},"product_reference":"libsqlite3-0-3.36.0-3.12.1.s390x","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"libsqlite3-0-3.36.0-3.12.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64"},"product_reference":"libsqlite3-0-3.36.0-3.12.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"libsqlite3-0-32bit-3.36.0-3.12.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64"},"product_reference":"libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-3.36.0-3.12.1.aarch64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64"},"product_reference":"sqlite3-3.36.0-3.12.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-3.36.0-3.12.1.ppc64le as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le"},"product_reference":"sqlite3-3.36.0-3.12.1.ppc64le","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-3.36.0-3.12.1.s390x as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x"},"product_reference":"sqlite3-3.36.0-3.12.1.s390x","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-3.36.0-3.12.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64"},"product_reference":"sqlite3-3.36.0-3.12.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-devel-3.36.0-3.12.1.aarch64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64"},"product_reference":"sqlite3-devel-3.36.0-3.12.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-devel-3.36.0-3.12.1.ppc64le as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le"},"product_reference":"sqlite3-devel-3.36.0-3.12.1.ppc64le","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-devel-3.36.0-3.12.1.s390x as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x"},"product_reference":"sqlite3-devel-3.36.0-3.12.1.s390x","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-devel-3.36.0-3.12.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64"},"product_reference":"sqlite3-devel-3.36.0-3.12.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"sqlite3-doc-3.36.0-3.12.1.noarch as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"},"product_reference":"sqlite3-doc-3.36.0-3.12.1.noarch","relates_to_product_reference":"openSUSE Leap 15.3"}]},"vulnerabilities":[{"cve":"CVE-2015-3414","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3414"}],"notes":[{"category":"general","text":"SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2015-3414","url":"https://www.suse.com/security/cve/CVE-2015-3414"},{"category":"external","summary":"SUSE Bug 1085790 for CVE-2015-3414","url":"https://bugzilla.suse.com/1085790"},{"category":"external","summary":"SUSE Bug 1190372 for CVE-2015-3414","url":"https://bugzilla.suse.com/1190372"},{"category":"external","summary":"SUSE Bug 1193078 for CVE-2015-3414","url":"https://bugzilla.suse.com/1193078"},{"category":"external","summary":"SUSE Bug 928700 for CVE-2015-3414","url":"https://bugzilla.suse.com/928700"},{"category":"external","summary":"SUSE Bug 928701 for CVE-2015-3414","url":"https://bugzilla.suse.com/928701"},{"category":"external","summary":"SUSE Bug 928702 for CVE-2015-3414","url":"https://bugzilla.suse.com/928702"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2015-3414"},{"cve":"CVE-2015-3415","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-3415"}],"notes":[{"category":"general","text":"The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2015-3415","url":"https://www.suse.com/security/cve/CVE-2015-3415"},{"category":"external","summary":"SUSE Bug 1190372 for CVE-2015-3415","url":"https://bugzilla.suse.com/1190372"},{"category":"external","summary":"SUSE Bug 928700 for CVE-2015-3415","url":"https://bugzilla.suse.com/928700"},{"category":"external","summary":"SUSE Bug 928701 for CVE-2015-3415","url":"https://bugzilla.suse.com/928701"},{"category":"external","summary":"SUSE Bug 928702 for CVE-2015-3415","url":"https://bugzilla.suse.com/928702"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":6.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2015-3415"},{"cve":"CVE-2019-19244","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19244"}],"notes":[{"category":"general","text":"sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19244","url":"https://www.suse.com/security/cve/CVE-2019-19244"},{"category":"external","summary":"SUSE Bug 1157817 for CVE-2019-19244","url":"https://bugzilla.suse.com/1157817"},{"category":"external","summary":"SUSE Bug 1157818 for CVE-2019-19244","url":"https://bugzilla.suse.com/1157818"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19244"},{"cve":"CVE-2019-19317","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19317"}],"notes":[{"category":"general","text":"lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19317","url":"https://www.suse.com/security/cve/CVE-2019-19317"},{"category":"external","summary":"SUSE Bug 1158812 for CVE-2019-19317","url":"https://bugzilla.suse.com/1158812"},{"category":"external","summary":"SUSE Bug 1196773 for CVE-2019-19317","url":"https://bugzilla.suse.com/1196773"},{"category":"external","summary":"SUSE Bug 1196775 for CVE-2019-19317","url":"https://bugzilla.suse.com/1196775"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19317"},{"cve":"CVE-2019-19603","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19603"}],"notes":[{"category":"general","text":"SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19603","url":"https://www.suse.com/security/cve/CVE-2019-19603"},{"category":"external","summary":"SUSE Bug 1158960 for CVE-2019-19603","url":"https://bugzilla.suse.com/1158960"},{"category":"external","summary":"SUSE Bug 1193078 for CVE-2019-19603","url":"https://bugzilla.suse.com/1193078"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"important"}],"title":"CVE-2019-19603"},{"cve":"CVE-2019-19645","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19645"}],"notes":[{"category":"general","text":"alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19645","url":"https://www.suse.com/security/cve/CVE-2019-19645"},{"category":"external","summary":"SUSE Bug 1158958 for CVE-2019-19645","url":"https://bugzilla.suse.com/1158958"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19645"},{"cve":"CVE-2019-19646","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19646"}],"notes":[{"category":"general","text":"pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19646","url":"https://www.suse.com/security/cve/CVE-2019-19646"},{"category":"external","summary":"SUSE Bug 1158959 for CVE-2019-19646","url":"https://bugzilla.suse.com/1158959"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19646"},{"cve":"CVE-2019-19880","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19880"}],"notes":[{"category":"general","text":"exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19880","url":"https://www.suse.com/security/cve/CVE-2019-19880"},{"category":"external","summary":"SUSE Bug 1159491 for CVE-2019-19880","url":"https://bugzilla.suse.com/1159491"},{"category":"external","summary":"SUSE Bug 1159715 for CVE-2019-19880","url":"https://bugzilla.suse.com/1159715"},{"category":"external","summary":"SUSE Bug 1162833 for CVE-2019-19880","url":"https://bugzilla.suse.com/1162833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"important"}],"title":"CVE-2019-19880"},{"cve":"CVE-2019-19923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19923"}],"notes":[{"category":"general","text":"flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19923","url":"https://www.suse.com/security/cve/CVE-2019-19923"},{"category":"external","summary":"SUSE Bug 1160309 for CVE-2019-19923","url":"https://bugzilla.suse.com/1160309"},{"category":"external","summary":"SUSE Bug 1162833 for CVE-2019-19923","url":"https://bugzilla.suse.com/1162833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19923"},{"cve":"CVE-2019-19924","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19924"}],"notes":[{"category":"general","text":"SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19924","url":"https://www.suse.com/security/cve/CVE-2019-19924"},{"category":"external","summary":"SUSE Bug 1159850 for CVE-2019-19924","url":"https://bugzilla.suse.com/1159850"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19924"},{"cve":"CVE-2019-19925","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19925"}],"notes":[{"category":"general","text":"zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19925","url":"https://www.suse.com/security/cve/CVE-2019-19925"},{"category":"external","summary":"SUSE Bug 1159847 for CVE-2019-19925","url":"https://bugzilla.suse.com/1159847"},{"category":"external","summary":"SUSE Bug 1162833 for CVE-2019-19925","url":"https://bugzilla.suse.com/1162833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"low"}],"title":"CVE-2019-19925"},{"cve":"CVE-2019-19926","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19926"}],"notes":[{"category":"general","text":"multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19926","url":"https://www.suse.com/security/cve/CVE-2019-19926"},{"category":"external","summary":"SUSE Bug 1159491 for CVE-2019-19926","url":"https://bugzilla.suse.com/1159491"},{"category":"external","summary":"SUSE Bug 1159715 for CVE-2019-19926","url":"https://bugzilla.suse.com/1159715"},{"category":"external","summary":"SUSE Bug 1162833 for CVE-2019-19926","url":"https://bugzilla.suse.com/1162833"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"important"}],"title":"CVE-2019-19926"},{"cve":"CVE-2019-19959","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19959"}],"notes":[{"category":"general","text":"ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-19959","url":"https://www.suse.com/security/cve/CVE-2019-19959"},{"category":"external","summary":"SUSE Bug 1160438 for CVE-2019-19959","url":"https://bugzilla.suse.com/1160438"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2019-19959"},{"cve":"CVE-2019-20218","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-20218"}],"notes":[{"category":"general","text":"selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2019-20218","url":"https://www.suse.com/security/cve/CVE-2019-20218"},{"category":"external","summary":"SUSE Bug 1160439 for CVE-2019-20218","url":"https://bugzilla.suse.com/1160439"},{"category":"external","summary":"SUSE Bug 1189840 for CVE-2019-20218","url":"https://bugzilla.suse.com/1189840"},{"category":"external","summary":"SUSE Bug 1190372 for CVE-2019-20218","url":"https://bugzilla.suse.com/1190372"},{"category":"external","summary":"SUSE Bug 1192495 for CVE-2019-20218","url":"https://bugzilla.suse.com/1192495"},{"category":"external","summary":"SUSE Bug 1193078 for CVE-2019-20218","url":"https://bugzilla.suse.com/1193078"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"important"}],"title":"CVE-2019-20218"},{"cve":"CVE-2020-13434","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-13434"}],"notes":[{"category":"general","text":"SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-13434","url":"https://www.suse.com/security/cve/CVE-2020-13434"},{"category":"external","summary":"SUSE Bug 1172115 for CVE-2020-13434","url":"https://bugzilla.suse.com/1172115"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-13434"},{"cve":"CVE-2020-13435","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-13435"}],"notes":[{"category":"general","text":"SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-13435","url":"https://www.suse.com/security/cve/CVE-2020-13435"},{"category":"external","summary":"SUSE Bug 1172091 for CVE-2020-13435","url":"https://bugzilla.suse.com/1172091"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":7.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"important"}],"title":"CVE-2020-13435"},{"cve":"CVE-2020-13630","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-13630"}],"notes":[{"category":"general","text":"ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-13630","url":"https://www.suse.com/security/cve/CVE-2020-13630"},{"category":"external","summary":"SUSE Bug 1172234 for CVE-2020-13630","url":"https://bugzilla.suse.com/1172234"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-13630"},{"cve":"CVE-2020-13631","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-13631"}],"notes":[{"category":"general","text":"SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-13631","url":"https://www.suse.com/security/cve/CVE-2020-13631"},{"category":"external","summary":"SUSE Bug 1172236 for CVE-2020-13631","url":"https://bugzilla.suse.com/1172236"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-13631"},{"cve":"CVE-2020-13632","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-13632"}],"notes":[{"category":"general","text":"ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-13632","url":"https://www.suse.com/security/cve/CVE-2020-13632"},{"category":"external","summary":"SUSE Bug 1172240 for CVE-2020-13632","url":"https://bugzilla.suse.com/1172240"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-13632"},{"cve":"CVE-2020-15358","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-15358"}],"notes":[{"category":"general","text":"In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-15358","url":"https://www.suse.com/security/cve/CVE-2020-15358"},{"category":"external","summary":"SUSE Bug 1173641 for CVE-2020-15358","url":"https://bugzilla.suse.com/1173641"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-15358"},{"cve":"CVE-2020-9327","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-9327"}],"notes":[{"category":"general","text":"In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]},"references":[{"category":"external","summary":"CVE-2020-9327","url":"https://www.suse.com/security/cve/CVE-2020-9327"},{"category":"external","summary":"SUSE Bug 1164719 for CVE-2020-9327","url":"https://bugzilla.suse.com/1164719"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:libsqlite3-0-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:libsqlite3-0-32bit-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.aarch64","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.ppc64le","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.s390x","openSUSE Leap 15.3:sqlite3-devel-3.36.0-3.12.1.x86_64","openSUSE Leap 15.3:sqlite3-doc-3.36.0-3.12.1.noarch"]}],"threats":[{"category":"impact","date":"2021-07-14T15:01:28Z","details":"moderate"}],"title":"CVE-2020-9327"}]}