Bug 1824174 (CVE-2020-11655)

Summary: CVE-2020-11655 sqlite: malformed window-function query leads to DoS
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alex, bazanluis20, databases-maint, drizt72, erik-fedora, fedora, itamar, jstanek, mschorm, nobody+pnasrat, odubaj, pkubat, praiskup, rh-spice-bugs, rjones, tcallawa, wilmer5
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-17 04:59:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1824175, 1824176, 1824177, 1824178, 1840140    
Bug Blocks: 1824191    

Description Guilherme de Almeida Suckevicz 2020-04-15 13:45:47 UTC
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Reference:
https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c

Upstream commit:
https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11

Comment 1 Guilherme de Almeida Suckevicz 2020-04-15 13:46:21 UTC
Created mingw-sqlite tracking bugs for this issue:

Affects: fedora-all [bug 1824176]


Created sqlite2 tracking bugs for this issue:

Affects: epel-all [bug 1824175]
Affects: fedora-all [bug 1824177]


Created sqlite3 tracking bugs for this issue:

Affects: fedora-all [bug 1824178]

Comment 2 Robert Scheck 2020-04-15 14:54:42 UTC
Why do I still get auto-Cc-ed for SQLite security flaws? I'm no longer a package maintainer of sqlite2 (for quite some time already), nor am I (co-)maintaining sqlite itself.

Comment 3 Guilherme de Almeida Suckevicz 2020-04-15 19:01:12 UTC
In reply to comment #2:
> Why do I still get auto-Cc-ed for SQLite security flaws? I'm no longer a
> package maintainer of sqlite2 (for quite some time already), nor am I
> (co-)maintaining sqlite itself.

This is because you still are the default assignee for the sqlite2 component in Fedora EPEL.

Comment 4 Huzaifa S. Sidhpurwala 2020-04-17 04:58:08 UTC
It seems like this issue existed since sqlite-3.25.0, when window function (https://www.sqlite.org/windowfunctions.html)  was added, but it lead to segmentation fault after https://www3.sqlite.org/cgi/src/info/712e47714863a8ed was committed, which could result in denial of service. This commit is a part of sqlite-3.30 release.

Therefore previous versions are not vulnerable to this flaw.

Comment 5 Huzaifa S. Sidhpurwala 2020-04-17 04:58:12 UTC
Statement:

It seems like this issue existed since sqlite-3.25.0, when window function (https://www.sqlite.org/windowfunctions.html)  was added, but it lead to segmentation fault after https://www3.sqlite.org/cgi/src/info/712e47714863a8ed was committed, which could result in denial of service. This commit is a part of sqlite-3.30 release.

Therefore previous versions are not vulnerable to this flaw.

Comment 6 Guilherme de Almeida Suckevicz 2020-05-26 13:04:09 UTC
Created sqlite tracking bugs for this issue:

Affects: fedora-all [bug 1840140]