gentoo-overlay/metadata/glsa/glsa-201904-21.xml

46 lines
1.6 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201904-21">
<title>SQLite: Remote code execution</title>
<synopsis>A vulnerability in SQLite may allow for the remote execution of
code.
</synopsis>
<product type="ebuild">sqlite</product>
<announced>2019-04-22</announced>
<revised count="1">2019-04-22</revised>
<bug>672942</bug>
<access>remote</access>
<affected>
<package name="dev-db/sqlite" auto="yes" arch="*">
<unaffected range="ge">3.25.3</unaffected>
<vulnerable range="lt">3.25.3</vulnerable>
</package>
</affected>
<background>
<p>SQLite is a C library that implements an SQL database engine.</p>
</background>
<description>
<p>An integer overflow was discovered in SQLites FTS3 extension.</p>
</description>
<impact type="normal">
<p>A remote attacker could, by executing arbitrary SQL statements against a
vulnerable host, execute arbitrary code.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All SQLite users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-db/sqlite-3.25.3"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346</uri>
</references>
<metadata tag="requester" timestamp="2019-04-20T00:53:44Z">b-man</metadata>
<metadata tag="submitter" timestamp="2019-04-22T23:31:33Z">b-man</metadata>
</glsa>