Your submission was sent successfully! Close

CVE-2020-11655

Published: 09 April 2020

SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
sqlite
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Needs triage

Ubuntu 21.04 (Hirsute Hippo) Needs triage

Ubuntu 20.04 LTS (Focal Fossa) Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

sqlite3
Launchpad, Ubuntu, Debian
Upstream
Released (3.31.1-5)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(3.31.1-5)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.31.1-5)
Ubuntu 20.04 LTS (Focal Fossa)
Released (3.31.1-4ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(code not present)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)
Patches:
Upstream: https://www.sqlite.org/cgi/src/info/712e47714863a8ed
Upstream: https://www.sqlite.org/cgi/src/info/4a302b42c7bf5e11
Upstream: https://www.sqlite.org/cgi/src/info/b64674919f673602
Upstream: https://github.com/sqlite/sqlite/commit/3251a2031bfd29f338a5fda1a08c18878296d354
Upstream: https://github.com/sqlite/sqlite/commit/c415d91007e1680e4eb17def583b202c3c83c718
Upstream: https://github.com/sqlite/sqlite/commit/4db7ab53f9c30e2e22731ace93ab6b18eef6c4ae