TencentOS Server 3: sqlite (TSSA-2022:0173)

high Nessus Plugin ID 238676

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2022:0173 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2020-35527:
In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.

CVE-2020-35525:
In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.

CVE-2019-19645:
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self- referential views in conjunction with ALTER TABLE statements.

CVE-2019-19880:
exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.

CVE-2019-5827:
Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

CVE-2019-13750:
Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.

CVE-2019-13751:
Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

CVE-2019-19603:
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.

CVE-2020-13435:
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20220173.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13750

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435

Plugin Details

Severity: High

ID: 238676

File Name: tencentos_TSSA_2022_0173.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:sqlite

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/12/2022

Vulnerability Publication Date: 11/12/2022