CVE-2020-15358

In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
References
Link Resource
https://www.sqlite.org/src/info/10fa79d00f8091e5 Patch Vendor Advisory
https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2 Patch Vendor Advisory
https://www.sqlite.org/src/tktview?name=8f157e8010 Exploit Vendor Advisory
https://security.netapp.com/advisory/ntap-20200709-0001/ Third Party Advisory
https://security.gentoo.org/glsa/202007-26 Third Party Advisory
https://usn.ubuntu.com/4438-1/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Third Party Advisory
https://support.apple.com/kb/HT211931 Third Party Advisory
https://support.apple.com/kb/HT211844 Third Party Advisory
https://support.apple.com/kb/HT211850 Third Party Advisory
https://support.apple.com/kb/HT211843 Third Party Advisory
https://support.apple.com/kb/HT211847 Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Third Party Advisory
https://support.apple.com/kb/HT212147 Third Party Advisory
http://seclists.org/fulldisclosure/2021/Feb/14 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*

Information

Published : 2020-06-27 12:15

Updated : 2022-05-12 03:01


NVD link : CVE-2020-15358

Mitre link : CVE-2020-15358

Products Affected
No products.
CWE