ID

VAR-202005-0223


CVE

CVE-2020-13631


TITLE

Red Hat Security Advisory 2021-2021-01

Trust: 0.1

sources: PACKETSTORM: 162694

DESCRIPTION

SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. SQLite is an open source embedded relational database management system based on C language developed by American D.Richard Hipp software developer. The system has the characteristics of independence, isolation and cross-platform. A security vulnerability exists in SQLite versions prior to 3.32.0. An attacker could exploit this vulnerability to rename the virtual form to the name of one of the shadow forms. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: mingw packages security and bug fix update Advisory ID: RHSA-2021:1968-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1968 Issue date: 2021-05-18 CVE Names: CVE-2019-16168 CVE-2020-13434 CVE-2020-13630 CVE-2020-13631 CVE-2020-13632 ==================================================================== 1. Summary: An update for mingw-binutils, mingw-bzip2, mingw-filesystem, and mingw-sqlite is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: MinGW is a free and open source software development environment to create Microsoft Windows applications. The following packages have been upgraded to a later upstream version: mingw-sqlite (3.26.0.0). Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat CodeReady Linux Builder (v. 8): Source: mingw-binutils-2.30-3.el8.src.rpm mingw-bzip2-1.0.6-14.el8.src.rpm mingw-filesystem-104-2.el8.src.rpm mingw-sqlite-3.26.0.0-1.el8.src.rpm aarch64: mingw-binutils-debuginfo-2.30-3.el8.aarch64.rpm mingw-binutils-debugsource-2.30-3.el8.aarch64.rpm mingw-binutils-generic-2.30-3.el8.aarch64.rpm mingw-binutils-generic-debuginfo-2.30-3.el8.aarch64.rpm mingw32-binutils-2.30-3.el8.aarch64.rpm mingw32-binutils-debuginfo-2.30-3.el8.aarch64.rpm mingw64-binutils-2.30-3.el8.aarch64.rpm mingw64-binutils-debuginfo-2.30-3.el8.aarch64.rpm noarch: mingw-filesystem-base-104-2.el8.noarch.rpm mingw32-bzip2-1.0.6-14.el8.noarch.rpm mingw32-bzip2-debuginfo-1.0.6-14.el8.noarch.rpm mingw32-bzip2-static-1.0.6-14.el8.noarch.rpm mingw32-filesystem-104-2.el8.noarch.rpm mingw32-sqlite-3.26.0.0-1.el8.noarch.rpm mingw32-sqlite-debuginfo-3.26.0.0-1.el8.noarch.rpm mingw32-sqlite-static-3.26.0.0-1.el8.noarch.rpm mingw64-bzip2-1.0.6-14.el8.noarch.rpm mingw64-bzip2-debuginfo-1.0.6-14.el8.noarch.rpm mingw64-bzip2-static-1.0.6-14.el8.noarch.rpm mingw64-filesystem-104-2.el8.noarch.rpm mingw64-sqlite-3.26.0.0-1.el8.noarch.rpm mingw64-sqlite-debuginfo-3.26.0.0-1.el8.noarch.rpm mingw64-sqlite-static-3.26.0.0-1.el8.noarch.rpm ppc64le: mingw-binutils-debuginfo-2.30-3.el8.ppc64le.rpm mingw-binutils-debugsource-2.30-3.el8.ppc64le.rpm mingw-binutils-generic-2.30-3.el8.ppc64le.rpm mingw-binutils-generic-debuginfo-2.30-3.el8.ppc64le.rpm mingw32-binutils-2.30-3.el8.ppc64le.rpm mingw32-binutils-debuginfo-2.30-3.el8.ppc64le.rpm mingw64-binutils-2.30-3.el8.ppc64le.rpm mingw64-binutils-debuginfo-2.30-3.el8.ppc64le.rpm s390x: mingw-binutils-debuginfo-2.30-3.el8.s390x.rpm mingw-binutils-debugsource-2.30-3.el8.s390x.rpm mingw-binutils-generic-2.30-3.el8.s390x.rpm mingw-binutils-generic-debuginfo-2.30-3.el8.s390x.rpm mingw32-binutils-2.30-3.el8.s390x.rpm mingw32-binutils-debuginfo-2.30-3.el8.s390x.rpm mingw64-binutils-2.30-3.el8.s390x.rpm mingw64-binutils-debuginfo-2.30-3.el8.s390x.rpm x86_64: mingw-binutils-debuginfo-2.30-3.el8.x86_64.rpm mingw-binutils-debugsource-2.30-3.el8.x86_64.rpm mingw-binutils-generic-2.30-3.el8.x86_64.rpm mingw-binutils-generic-debuginfo-2.30-3.el8.x86_64.rpm mingw32-binutils-2.30-3.el8.x86_64.rpm mingw32-binutils-debuginfo-2.30-3.el8.x86_64.rpm mingw64-binutils-2.30-3.el8.x86_64.rpm mingw64-binutils-debuginfo-2.30-3.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYKPxbdzjgjWX9erEAQgodQ/+NmIb/oDuS6uoA9WfD36xVTffsjTsgfFC EI/5+/9lv7i8AyOig/lyHF8j69RX0W0eNR/Vl+DMT/H6XuqusJ5amOGD5LuP0TEp Dep644tOoK5rd0PD1RT/fY9YTyzzaCkhsHYtV3FYtbh4P82FSGuOo5Tdw597GwHK GIp+T0pIzZGgvlO0OYObEuC75bfZ2xR54zWAtZ2YZyhc7jSqwcSDB5VLaR9Vqa5A /cgFid2haP8UFokSzYBtJwnImIrFI0SP6Q3gu0NjqfU2+E/pVyEmsdCHUfJjU5cy UaBnM0qKDWdLqeUJSCFeaDaJ8i45qPZYKz6qXBezY+ko42ElBXlAW/pA1GCbbc8K yXFziu/YZnOB+FqGa1UFHMJLDIhI9rG9BITjDfD3UAzgA6YUF5eBy2rP5bqrq86+ puSPGzoCZLGAXOd4RQTK6NOIUOnT+jdNXyzXlkG/leoWjuMHva+3415MDl5SWuel wOXXGphzanYRTkHim8U6yC1PQxnh8J6pbDZyYXpJY8hnrFFMw5VGhMBpoac/pdkk 0jNE1bd06+9gtkxBV2T2VHrHOFoSzi00hubq7DszPPxUfjpHelud6CS3/HSU7iRj CXTqVshZ9lEguvbmb6flsp01/jDUlbPA18NBMVX2WEgZp1duHpS7Mn5FZM+PHwfK 1mKR5jfd/6Q=+R6x -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bug Fix(es): * Configuring the system with non-RT kernel will hang the system (BZ#1923220) 3. Bugs fixed (https://bugzilla.redhat.com/): 1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service 5. JIRA issues fixed (https://issues.jboss.org/): CNF-802 - Infrastructure-provided enablement/disablement of interrupt processing for guaranteed pod CPUs CNF-854 - Performance tests in CNF Tests 6. ========================================================================== Ubuntu Security Notice USN-4394-1 June 10, 2020 sqlite3 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in SQLite. Software Description: - sqlite3: C library that implements an SQL database engine Details: It was discovered that SQLite incorrectly handled certain corruped schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-8740) It was discovered that SQLite incorrectly handled certain SELECT statements. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 19.10. (CVE-2019-19603) It was discovered that SQLite incorrectly handled certain self-referential views. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 19.10. (CVE-2019-19645) Henry Liu discovered that SQLite incorrectly handled certain malformed window-function queries. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-11655) It was discovered that SQLite incorrectly handled certain string operations. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-13434) It was discovered that SQLite incorrectly handled certain expressions. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-13435) It was discovered that SQLite incorrectly handled certain fts3 queries. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 19.10 and Ubuntu 20.04 LTS. (CVE-2020-13631) It was discovered that SQLite incorrectly handled certain fts3 queries. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-13632) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libsqlite3-0 3.31.1-4ubuntu0.1 sqlite3 3.31.1-4ubuntu0.1 Ubuntu 19.10: libsqlite3-0 3.29.0-2ubuntu0.3 sqlite3 3.29.0-2ubuntu0.3 Ubuntu 18.04 LTS: libsqlite3-0 3.22.0-1ubuntu0.4 sqlite3 3.22.0-1ubuntu0.4 Ubuntu 16.04 LTS: libsqlite3-0 3.11.0-1ubuntu1.5 sqlite3 3.11.0-1ubuntu1.5 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4394-1 CVE-2018-8740, CVE-2019-19603, CVE-2019-19645, CVE-2020-11655, CVE-2020-13434, CVE-2020-13435, CVE-2020-13630, CVE-2020-13631, CVE-2020-13632 Package Information: https://launchpad.net/ubuntu/+source/sqlite3/3.31.1-4ubuntu0.1 https://launchpad.net/ubuntu/+source/sqlite3/3.29.0-2ubuntu0.3 https://launchpad.net/ubuntu/+source/sqlite3/3.22.0-1ubuntu0.4 https://launchpad.net/ubuntu/+source/sqlite3/3.11.0-1ubuntu1.5 . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHEA-2020:5633 All OpenShift Container Platform users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 1823765 - nfd-workers crash under an ipv6 environment 1838802 - mysql8 connector from operatorhub does not work with metering operator 1838845 - Metering operator can't connect to postgres DB from Operator Hub 1841883 - namespace-persistentvolumeclaim-usage query returns unexpected values 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1868294 - NFD operator does not allow customisation of nfd-worker.conf 1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration 1890672 - NFD is missing a build flag to build correctly 1890741 - path to the CA trust bundle ConfigMap is broken in report operator 1897346 - NFD worker pods not scheduler on a 3 node master/worker cluster 1898373 - Metering operator failing upgrade from 4.4 to 4.6 channel 1900125 - FIPS error while generating RSA private key for CA 1906129 - OCP 4.7: Node Feature Discovery (NFD) Operator in CrashLoopBackOff when deployed from OperatorHub 1908492 - OCP 4.7: Node Feature Discovery (NFD) Operator Custom Resource Definition file in olm-catalog is not in sync with the one in manifests dir leading to failed deployment from OperatorHub 1913837 - The CI and ART 4.7 metering images are not mirrored 1914869 - OCP 4.7 NFD - Operand configuration options for NodeFeatureDiscovery are empty, no supported image for ppc64le 1916010 - olm skip range is set to the wrong range 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923998 - NFD Operator is failing to update and remains in Replacing state 5. Solution: See the documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/ 4.6/html/serverless_applications/index 4. Bugs fixed (https://bugzilla.redhat.com/): 1874857 - CVE-2020-24553 golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1897643 - CVE-2020-28366 golang: malicious symbol names can lead to code execution at build time 1897646 - CVE-2020-28367 golang: improper validation of cgo flags can lead to code execution at build time 1906381 - Release of OpenShift Serverless Serving 1.12.0 1906382 - Release of OpenShift Serverless Eventing 1.12.0 5

Trust: 1.71

sources: NVD: CVE-2020-13631 // VULHUB: VHN-166429 // VULMON: CVE-2020-13631 // PACKETSTORM: 162694 // PACKETSTORM: 162659 // PACKETSTORM: 160125 // PACKETSTORM: 161548 // PACKETSTORM: 158024 // PACKETSTORM: 161536 // PACKETSTORM: 160961

AFFECTED PRODUCTS

vendor:oraclemodel:communications network charging and controlscope:lteversion:12.0.3

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:14.0

Trust: 1.0

vendor:oraclemodel:zfs storage appliance kitscope:eqversion:8.8

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:siemensmodel:sinec infrastructure network servicesscope:ltversion:1.0.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:14.0

Trust: 1.0

vendor:oraclemodel:outside in technologyscope:eqversion:8.5.5

Trust: 1.0

vendor:brocademodel:fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:11.5

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.10.9

Trust: 1.0

vendor:oraclemodel:communications network charging and controlscope:eqversion:6.0.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:sqlitemodel:sqlitescope:ltversion:3.32.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:7.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.0.1

Trust: 1.0

vendor:oraclemodel:outside in technologyscope:eqversion:8.5.4

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications network charging and controlscope:gteversion:12.0.0

Trust: 1.0

sources: NVD: CVE-2020-13631

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-13631
value: MEDIUM

Trust: 1.0

VULHUB: VHN-166429
value: LOW

Trust: 0.1

VULMON: CVE-2020-13631
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-13631
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-166429
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-13631
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-166429 // VULMON: CVE-2020-13631 // NVD: CVE-2020-13631

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2020-13631

TYPE

overflow

Trust: 0.2

sources: PACKETSTORM: 162659 // PACKETSTORM: 161548

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-166429

PATCH

title:Red Hat: Moderate: sqlite security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204442 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: sqlite3 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4394-1

Trust: 0.1

title:Red Hat: Moderate: Release of OpenShift Serverless 1.11.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205149 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Release of OpenShift Serverless 1.12.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210146 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Quay v3.3.3 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210050 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6 compliance-operator security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210190 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6 compliance-operator security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210436 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205605 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=4a9822530e6b610875f83ffc10e02aba

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:snykturl:https://github.com/garethr/snykt

Trust: 0.1

title:xyz-solutionsurl:https://github.com/sauliuspr/xyz-solutions

Trust: 0.1

title:snykouturl:https://github.com/garethr/snykout

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2020-13631

EXTERNAL IDS

db:NVDid:CVE-2020-13631

Trust: 1.9

db:SIEMENSid:SSA-389290

Trust: 1.2

db:PACKETSTORMid:162659

Trust: 0.2

db:PACKETSTORMid:161548

Trust: 0.2

db:PACKETSTORMid:162694

Trust: 0.2

db:PACKETSTORMid:160125

Trust: 0.2

db:PACKETSTORMid:160961

Trust: 0.2

db:PACKETSTORMid:159817

Trust: 0.1

db:PACKETSTORMid:160062

Trust: 0.1

db:PACKETSTORMid:160061

Trust: 0.1

db:PACKETSTORMid:160064

Trust: 0.1

db:PACKETSTORMid:158592

Trust: 0.1

db:PACKETSTORMid:160545

Trust: 0.1

db:CNNVDid:CNNVD-202005-1351

Trust: 0.1

db:CNVDid:CNVD-2020-50093

Trust: 0.1

db:VULHUBid:VHN-166429

Trust: 0.1

db:ICS CERTid:ICSA-22-069-09

Trust: 0.1

db:VULMONid:CVE-2020-13631

Trust: 0.1

db:PACKETSTORMid:158024

Trust: 0.1

db:PACKETSTORMid:161536

Trust: 0.1

sources: VULHUB: VHN-166429 // VULMON: CVE-2020-13631 // PACKETSTORM: 162694 // PACKETSTORM: 162659 // PACKETSTORM: 160125 // PACKETSTORM: 161548 // PACKETSTORM: 158024 // PACKETSTORM: 161536 // PACKETSTORM: 160961 // NVD: CVE-2020-13631

REFERENCES

url:https://usn.ubuntu.com/4394-1/

Trust: 1.3

url:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf

Trust: 1.2

url:https://support.apple.com/kb/ht211843

Trust: 1.2

url:https://support.apple.com/kb/ht211844

Trust: 1.2

url:https://support.apple.com/kb/ht211850

Trust: 1.2

url:https://support.apple.com/kb/ht211931

Trust: 1.2

url:https://support.apple.com/kb/ht211935

Trust: 1.2

url:https://support.apple.com/kb/ht211952

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20200608-0002/

Trust: 1.2

url:https://security.freebsd.org/advisories/freebsd-sa-20:22.sqlite.asc

Trust: 1.2

url:http://seclists.org/fulldisclosure/2020/nov/20

Trust: 1.2

url:http://seclists.org/fulldisclosure/2020/nov/19

Trust: 1.2

url:http://seclists.org/fulldisclosure/2020/nov/22

Trust: 1.2

url:http://seclists.org/fulldisclosure/2020/dec/32

Trust: 1.2

url:https://security.gentoo.org/glsa/202007-26

Trust: 1.2

url:https://bugs.chromium.org/p/chromium/issues/detail?id=1080459

Trust: 1.2

url:https://sqlite.org/src/info/eca0ba2cf4c0fdf7

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/l7kxqwhiy2mqp4lnm6odwjenmxyyqybn/

Trust: 1.1

url:https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3cissues.guacamole.apache.org%3e

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13631

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-16168

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-13630

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-13631

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-13632

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-13630

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-16168

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-19221

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-19906

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-7595

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-13632

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-9327

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-20387

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-5018

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20218

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-19906

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-19221

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-6405

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-20388

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-20843

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20388

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-15903

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2018-20843

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20387

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-5018

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-19956

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-15903

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-19956

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-20218

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-20916

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-20907

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-20907

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8492

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-16935

Trust: 0.4

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-14422

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-16935

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-20916

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-10029

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-1752

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-1751

Trust: 0.4

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-1730

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-10029

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24659

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-1971

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-14422

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13434

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1752

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless_applications/index

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25211

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17450

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-15165

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14382

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17450

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-15165

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/l7kxqwhiy2mqp4lnm6odwjenmxyyqybn/

Trust: 0.1

url:https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3cissues.guacamole.apache.org%3e

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/garethr/snykt

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-069-09

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.5/html/serverless_applications/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3115

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9327

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3449

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7595

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1968

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5149

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-1551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14040

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10725

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10723

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10722

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10726

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27813

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5364

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11655

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sqlite3/3.22.0-1ubuntu0.4

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://usn.ubuntu.com/4394-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sqlite3/3.29.0-2ubuntu0.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sqlite3/3.31.1-4ubuntu0.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8740

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sqlite3/3.11.0-1ubuntu1.5

Trust: 0.1

url:https://access.redhat.com/errata/rhea-2020:5633

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8624

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5635

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15157

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25658

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3884

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8622

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13225

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3898

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0146

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1971

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24659

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28366

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28366

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28367

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28367

Trust: 0.1

sources: VULHUB: VHN-166429 // VULMON: CVE-2020-13631 // PACKETSTORM: 162694 // PACKETSTORM: 162659 // PACKETSTORM: 160125 // PACKETSTORM: 161548 // PACKETSTORM: 158024 // PACKETSTORM: 161536 // PACKETSTORM: 160961 // NVD: CVE-2020-13631

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 162694 // PACKETSTORM: 162659 // PACKETSTORM: 160125 // PACKETSTORM: 161548 // PACKETSTORM: 161536 // PACKETSTORM: 160961

SOURCES

db:VULHUBid:VHN-166429
db:VULMONid:CVE-2020-13631
db:PACKETSTORMid:162694
db:PACKETSTORMid:162659
db:PACKETSTORMid:160125
db:PACKETSTORMid:161548
db:PACKETSTORMid:158024
db:PACKETSTORMid:161536
db:PACKETSTORMid:160961
db:NVDid:CVE-2020-13631

LAST UPDATE DATE

2026-03-24T21:04:18.570000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-166429date:2022-05-13T00:00:00
db:VULMONid:CVE-2020-13631date:2023-11-07T00:00:00
db:NVDid:CVE-2020-13631date:2024-11-21T05:01:38.243

SOURCES RELEASE DATE

db:VULHUBid:VHN-166429date:2020-05-27T00:00:00
db:VULMONid:CVE-2020-13631date:2020-05-27T00:00:00
db:PACKETSTORMid:162694date:2021-05-19T14:19:18
db:PACKETSTORMid:162659date:2021-05-19T14:07:02
db:PACKETSTORMid:160125date:2020-11-18T20:48:43
db:PACKETSTORMid:161548date:2021-02-25T15:30:03
db:PACKETSTORMid:158024date:2020-06-10T15:13:56
db:PACKETSTORMid:161536date:2021-02-25T15:26:54
db:PACKETSTORMid:160961date:2021-01-15T15:06:55
db:NVDid:CVE-2020-13631date:2020-05-27T15:15:12.947