Debian dla-3107 : lemon - security update

critical Nessus Plugin ID 164992

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3107 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3107-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb September 13, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : sqlite3 Version : 3.27.2-3+deb10u2 CVE IDs : CVE-2020-35525 CVE-2020-35527 CVE-2021-20223

It was discovered that there were three issues in SQLite:

* CVE-2020-35525: Prevent a potential null pointer deference issue in INTERSEC query processing.

* CVE-2020-35527: Prevent an out-of-bounds access issue that could be exploited via ALTER TABLE in views that have a nested FROM clauses.

* CVE-2021-20223: Prevent an issue with the unicode61 tokenizer related to Unicode control characters (class Cc) and embedded NUL characters being misinterpreted as tokens.


For Debian 10 buster, these problems have been fixed in version 3.27.2-3+deb10u2.

We recommend that you upgrade your sqlite3 packages.

For the detailed security status of sqlite3 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/sqlite3

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the lemon packages.

See Also

https://security-tracker.debian.org/tracker/CVE-2020-35525

https://security-tracker.debian.org/tracker/CVE-2020-35527

https://security-tracker.debian.org/tracker/CVE-2021-20223

https://security-tracker.debian.org/tracker/source-package/sqlite3

https://packages.debian.org/source/buster/sqlite3

Plugin Details

Severity: Critical

ID: 164992

File Name: debian_DLA-3107.nasl

Version: 1.4

Type: local

Agent: unix

Published: 9/13/2022

Updated: 1/22/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-35527

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:sqlite3-doc, p-cpe:/a:debian:debian_linux:sqlite3, p-cpe:/a:debian:debian_linux:libsqlite3-0, p-cpe:/a:debian:debian_linux:libsqlite3-tcl, p-cpe:/a:debian:debian_linux:libsqlite3-dev, p-cpe:/a:debian:debian_linux:lemon

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/13/2022

Vulnerability Publication Date: 8/25/2022

Reference Information

CVE: CVE-2020-35525, CVE-2020-35527, CVE-2021-20223