Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-11655

Published: 9 April 2020

SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Notes

AuthorNote
mdeslaur
per upstream bug, introduced in 3.25

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
sqlite
Launchpad, Ubuntu, Debian
bionic Needs triage

eoan Ignored
(reached end-of-life)
focal Needs triage

groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish Ignored
(reached end-of-life)
jammy Needs triage

kinetic Needs triage

precise Does not exist

trusty Needs triage

upstream Needs triage

xenial Needs triage

sqlite3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
eoan
Released (3.29.0-2ubuntu0.3)
focal
Released (3.31.1-4ubuntu0.1)
groovy Not vulnerable
(3.31.1-5)
hirsute Not vulnerable
(3.31.1-5)
impish Not vulnerable
(3.31.1-5)
jammy Not vulnerable
(3.31.1-5)
kinetic Not vulnerable
(3.31.1-5)
precise Not vulnerable
(code not present)
trusty Not vulnerable
(code not present)
upstream
Released (3.31.1-5)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://www.sqlite.org/cgi/src/info/712e47714863a8ed
upstream: https://www.sqlite.org/cgi/src/info/4a302b42c7bf5e11
upstream: https://www.sqlite.org/cgi/src/info/b64674919f673602
upstream: https://github.com/sqlite/sqlite/commit/3251a2031bfd29f338a5fda1a08c18878296d354
upstream: https://github.com/sqlite/sqlite/commit/c415d91007e1680e4eb17def583b202c3c83c718
upstream: https://github.com/sqlite/sqlite/commit/4db7ab53f9c30e2e22731ace93ab6b18eef6c4ae

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H