FERRAMENTAS LINUX: Critical SQLite3 Security Update: Patch CVE-2025-29087 & CVE-2025-29088 Now

quarta-feira, 7 de maio de 2025

Critical SQLite3 Security Update: Patch CVE-2025-29087 & CVE-2025-29088 Now

 

SUSE


Critical SQLite3 update patches CVE-2025-29087 & CVE-2025-29088—integer overflows allowing RCE & memory corruption. Learn how to secure SUSE Linux, openSUSE, and enterprise systems with this high-priority patch. Includes installation commands and risk analysis.


LinuxSecurity Advisory | High-Priority Patch Release

SQLite3, the lightweight database engine powering millions of applications, has released a critical security update addressing high-risk vulnerabilities. Enterprise users and developers must apply these patches immediately to prevent potential exploits.

Key Security Fixes in SQLite3 v3.49.1

This update resolves two major CVEs with serious implications:

✔ CVE-2025-29087 – Integer overflow in SQLite’s concat() function (bsc#1241020)

  • Risk: Remote code execution or denial-of-service attacks

  • Impact: Affects applications using string concatenation in queries

✔ CVE-2025-29088 – Integer overflow via SQLITE_DBCONFIG_LOOKASIDE (bsc#1241078)

  • Risk: Memory corruption leading to privilege escalation

  • Impact: Systems with high-concurrency database operations

Additional improvements include performance optimizations and stability enhancements (jsc#SLE-16032).


Patch Installation Guide for SUSE Systems

Apply this update immediately using one of these methods:

Recommended Methods

  • YaST Online Update (GUI)

  • Command Line:

    bash
    Copy
    Download
    zypper patch

Manual Patch Commands by Distribution

OS VersionInstall Command
openSUSE Leap 15.6zypper in -t patch openSUSE-SLE-15.6-2025-1456=1
SUSE Linux Enterprise Micro 5.5zypper in -t patch SUSE-SLE-Micro-5.5-2025-1456=1
Basesystem Module 15-SP6zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1456=1

Why This Update Matters for Enterprises

SQLite3 is embedded in:

  • Web browsers (Chrome, Firefox)

  • Mobile apps (Android, iOS)

  • IoT devices and industrial systems

Delaying patching risks:

  • Data breaches via SQL injection

  • System crashes from memory corruption

  • Compliance violations (GDPR, HIPAA)


Affected Packages & References

Updated Packages

  • sqlite3-3.49.1 (core)

  • libsqlite3-0 (runtime)

  • sqlite3-devel (development headers)

  • Debug symbols for troubleshooting

Official References


FAQ: SQLite3 Security Update

Q: How urgent is this patch?
A: Critical. Both CVEs are exploitable remotely in vulnerable configurations.

Q: Does this affect containerized environments?
A: Yes. Update base images and rebuild containers.

Q: Are Windows/macOS systems vulnerable?
A: Only if using unpatched SQLite3 versions. Check dependencies with ldd or otool.

Nenhum comentário:

Postar um comentário