{"schema_version":"1.7.2","id":"OESA-2022-1877","modified":"2022-09-01T11:04:13Z","published":"2022-09-01T11:04:13Z","upstream":["CVE-2021-20223"],"summary":"sqlite security update","details":"SQLite is a C-language library that implements a small, fast, self-contained,high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.It also include lemon and sqlite3_analyzer and tcl tools.\r\n\r\nSecurity Fix(es):\r\n\r\nAn issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode \u0026quot;control-characters\u0026quot; (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later.(CVE-2021-20223)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"sqlite","purl":"pkg:rpm/openEuler/sqlite\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.32.3-5.oe1"}]}],"ecosystem_specific":{"aarch64":["sqlite-devel-3.32.3-5.oe1.aarch64.rpm","sqlite-3.32.3-5.oe1.aarch64.rpm","sqlite-debuginfo-3.32.3-5.oe1.aarch64.rpm","sqlite-debugsource-3.32.3-5.oe1.aarch64.rpm"],"noarch":["sqlite-help-3.32.3-5.oe1.noarch.rpm"],"src":["sqlite-3.32.3-5.oe1.src.rpm"],"x86_64":["sqlite-devel-3.32.3-5.oe1.x86_64.rpm","sqlite-debuginfo-3.32.3-5.oe1.x86_64.rpm","sqlite-debugsource-3.32.3-5.oe1.x86_64.rpm","sqlite-3.32.3-5.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20223"}],"database_specific":{"severity":"Critical"}}