Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-11655

Published: 9 April 2020

SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Notes

AuthorNote
mdeslaur
per upstream bug, introduced in 3.25

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
sqlite
Launchpad, Ubuntu, Debian
upstream Needs triage

trusty Needs triage

bionic Needs triage

eoan Ignored
(end of life)
focal Needs triage

groovy Ignored
(end of life)
hirsute Ignored
(end of life)
xenial Needs triage

jammy Needs triage

impish Ignored
(end of life)
kinetic Ignored
(end of life, was needs-triage)
lunar Does not exist

sqlite3
Launchpad, Ubuntu, Debian
upstream
Released (3.31.1-5)
bionic Not vulnerable
(code not present)
impish Not vulnerable
(3.31.1-5)
focal
Released (3.31.1-4ubuntu0.1)
groovy Not vulnerable
(3.31.1-5)
hirsute Not vulnerable
(3.31.1-5)
jammy Not vulnerable
(3.31.1-5)
kinetic Not vulnerable
(3.31.1-5)
lunar Not vulnerable
(3.31.1-5)
eoan
Released (3.29.0-2ubuntu0.3)
trusty Not vulnerable
(code not present)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://www.sqlite.org/cgi/src/info/712e47714863a8ed
upstream: https://www.sqlite.org/cgi/src/info/4a302b42c7bf5e11
upstream: https://www.sqlite.org/cgi/src/info/b64674919f673602
upstream: https://github.com/sqlite/sqlite/commit/3251a2031bfd29f338a5fda1a08c18878296d354
upstream: https://github.com/sqlite/sqlite/commit/c415d91007e1680e4eb17def583b202c3c83c718
upstream: https://github.com/sqlite/sqlite/commit/4db7ab53f9c30e2e22731ace93ab6b18eef6c4ae

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H