Описание
Security update for sqlite3
This update for sqlite3 fixes the following issues:
- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)
Other fixes:
- Updated to version 3.49.1 from Factory (jsc#SLE-16032)
Список пакетов
Container bci/bci-sle15-kernel-module-devel:15.7
Container bci/bci-sle15-kernel-module-devel:latest
Container bci/kiwi:latest
Container bci/openjdk-devel:17
Container bci/openjdk-devel:latest
Container bci/openjdk:17
Container bci/openjdk:latest
Container bci/python:3
Container bci/python:3.13
Container bci/python:latest
Container bci/ruby:3
Container bci/ruby:latest
Container bci/spack:0.23
Container bci/spack:latest
Container suse/389-ds:latest
Container suse/cosign:latest
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
Container suse/kiosk/firefox-esr:latest
Container suse/ltss/sle15.3/bci-base:latest
Container suse/ltss/sle15.4/bci-base:latest
Container suse/ltss/sle15.5/sle15:latest
Container suse/manager/4.3/proxy-httpd:latest
Container suse/manager/4.3/proxy-salt-broker:latest
Container suse/manager/4.3/proxy-squid:latest
Container suse/manager/4.3/proxy-ssh:latest
Container suse/manager/4.3/proxy-tftpd:latest
Container suse/manager/5.0/x86_64/server:latest
Container suse/rmt-server:latest
Container suse/sle-micro-rancher/5.2:latest
Container suse/sle-micro-rancher/5.3:latest
Container suse/sle-micro-rancher/5.4:latest
Container suse/sle-micro/5.1/toolbox:latest
Container suse/sle-micro/5.2/toolbox:latest
Container suse/sle-micro/5.3/toolbox:latest
Container suse/sle-micro/5.4/toolbox:latest
Container suse/sle-micro/5.5/toolbox:latest
Container suse/sle-micro/5.5:latest
Container suse/sle-micro/base-5.5:latest
Container suse/sle-micro/kvm-5.5:latest
Container suse/sle-micro/rt-5.5:latest
Container suse/sle15:15.6
Image SLES15-SP4-BYOS
Image SLES15-SP4-BYOS-GCE
Image SLES15-SP4-Hardened-BYOS
Image SLES15-SP4-Hardened-BYOS-GCE
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-SAP-BYOS
Image SLES15-SP4-SAP-BYOS-GCE
Image SLES15-SP5-Azure-3P
Image SLES15-SP5-BYOS-GCE
Image SLES15-SP5-CHOST-BYOS-Aliyun
Image SLES15-SP5-CHOST-BYOS-Azure
Image SLES15-SP5-CHOST-BYOS-EC2
Image SLES15-SP5-CHOST-BYOS-GCE
Image SLES15-SP5-CHOST-BYOS-GDC
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
Image SLES15-SP5-GCE
Image SLES15-SP5-Hardened-BYOS-GCE
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
Image SLES15-SP6
Image SLES15-SP6-Azure-3P
Image SLES15-SP6-Azure-Standard
Image SLES15-SP6-BYOS
Image SLES15-SP6-BYOS-EC2
Image SLES15-SP6-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS
Image SLES15-SP6-CHOST-BYOS-Aliyun
Image SLES15-SP6-CHOST-BYOS-Azure
Image SLES15-SP6-CHOST-BYOS-EC2
Image SLES15-SP6-CHOST-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS-GDC
Image SLES15-SP6-CHOST-BYOS-SAP-CCloud
Image SLES15-SP6-GCE
Image SLES15-SP6-Hardened-BYOS
Image SLES15-SP6-Hardened-BYOS-EC2
Image SLES15-SP6-Hardened-BYOS-GCE
Image SLES15-SP6-SAP
Image SLES15-SP6-SAP-GCE
Image SLES15-SP6-SAP-Hardened-BYOS
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
Image SLES15-SP6-SAP-Hardened-EC2
Image SLES15-SP6-SAPCAL
Image SLES15-SP6-SAPCAL-GCE
SUSE Linux Enterprise Module for Basesystem 15 SP7
Ссылки
- Link for SUSE-SU-2025:01456-1
- E-Mail link for SUSE-SU-2025:01456-1
- SUSE Security Ratings
- SUSE Bug 1241020
- SUSE Bug 1241078
- SUSE Bug 1241189
- SUSE CVE CVE-2025-29087 page
- SUSE CVE CVE-2025-29088 page
- SUSE CVE CVE-2025-3277 page
Описание
In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory.
Затронутые продукты
Ссылки
- CVE-2025-29087
- SUSE Bug 1241020
Описание
In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.
Затронутые продукты
Ссылки
- CVE-2025-29088
- SUSE Bug 1241078
Описание
An integer overflow can be triggered in SQLite's `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
Затронутые продукты
Ссылки
- CVE-2025-3277
- SUSE Bug 1241189