Bug 1206337 (CVE-2022-46908) - VUL-0: CVE-2022-46908: sqlite3: relying on --safe for execution of an untrusted CLI script
Summary: VUL-0: CVE-2022-46908: sqlite3: relying on --safe for execution of an untrust...
Status: RESOLVED FIXED
Alias: CVE-2022-46908
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/350271/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-46908:7.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-12-12 15:43 UTC by Alexander Bergmann
Modified: 2024-05-03 09:23 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2022-12-12 15:43:46 UTC
CVE-2022-46908

SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI
script, does not properly implement the azProhibitedFunctions protection
mechanism, and instead allows UDF functions such as WRITEFILE.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46908
https://www.cve.org/CVERecord?id=CVE-2022-46908
https://sqlite.org/src/info/cefc032473ac5ad2
https://sqlite.org/forum/forumpost/07beac8056151b2f
https://news.ycombinator.com/item?id=33948588
Comment 1 Reinhard Max 2022-12-16 18:05:41 UTC
Submitted to Factory, SLE-12-SP1 and SLE-15. SLE-11-SP2 is not affected, because the version there does not yet support --safe .
Comment 2 OBSbugzilla Bot 2022-12-16 18:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1206337) was mentioned in
https://build.opensuse.org/request/show/1043393 Factory / sqlite3
Comment 4 Swamp Workflow Management 2022-12-21 17:23:08 UTC
SUSE-SU-2022:4603-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1206337
CVE References: CVE-2022-46908
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    sqlite3-3.39.3-9.26.1
SUSE Linux Enterprise Server 12-SP5 (src):    sqlite3-3.39.3-9.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2022-12-28 14:25:28 UTC
SUSE-SU-2022:4628-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1206337
CVE References: CVE-2022-46908
JIRA References: 
Sources used:
openSUSE Leap Micro 5.3 (src):    sqlite3-3.39.3-150000.3.20.1
openSUSE Leap Micro 5.2 (src):    sqlite3-3.39.3-150000.3.20.1
openSUSE Leap 15.4 (src):    sqlite3-3.39.3-150000.3.20.1
openSUSE Leap 15.3 (src):    sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Realtime Extension 15-SP3 (src):    sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Micro 5.3 (src):    sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Micro 5.2 (src):    sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Micro 5.1 (src):    sqlite3-3.39.3-150000.3.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-06-28 11:42:52 UTC
SUSE-SU-2023:2668-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1206337
CVE References: CVE-2022-46908
Sources used:
SUSE OpenStack Cloud 9 (src): sqlite3-3.39.3-9.26.1
SUSE OpenStack Cloud Crowbar 9 (src): sqlite3-3.39.3-9.26.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): sqlite3-3.39.3-9.26.1
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): sqlite3-3.39.3-9.26.1
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): sqlite3-3.39.3-9.26.1
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): sqlite3-3.39.3-9.26.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-06-29 20:30:17 UTC
SUSE-SU-2023:1295-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1206337
CVE References: CVE-2022-46908
Sources used:
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Manager Proxy 4.2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Manager Retail Branch Server 4.2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Manager Server 4.2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Enterprise Storage 7.1 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Enterprise Storage 7 (src): sqlite3-3.39.3-150000.3.20.1
SUSE CaaS Platform 4.0 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): sqlite3-3.39.3-150000.3.20.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): sqlite3-3.39.3-150000.3.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Robert Frohl 2024-05-03 09:23:43 UTC
done, closing