Bug 1841231 (CVE-2020-13435)
Summary: | CVE-2020-13435 sqlite: NULL pointer dereference in sqlite3ExprCodeTarget() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alex, databases-maint, drizt72, erik-fedora, fedora, itamar, mschorm, odubaj, pkubat, praiskup, rh-spice-bugs, rjones, wilmer5 |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | sqlite 3.32.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A NULL pointer dereference flaw was found in SQLite when rewriting select statements for window functions. This flaw allows an attacker who can execute SQL statements, to crash the application, resulting in a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-28 11:00:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1841232, 1841233, 1841234, 1841235, 1846249, 1846260, 1846261 | ||
Bug Blocks: | 1841236 |
Description
Guilherme de Almeida Suckevicz
2020-05-28 16:48:10 UTC
Created mingw-sqlite tracking bugs for this issue: Affects: fedora-all [bug 1841233] Created sqlite tracking bugs for this issue: Affects: fedora-all [bug 1841235] Created sqlite2 tracking bugs for this issue: Affects: epel-all [bug 1841232] Affects: fedora-all [bug 1841234] Upstream fix: https://www.sqlite.org/src/info/ad7bb70af9bb68d1 Under some circumstances it is possible for a SQL expression to cause a NULL pointer dereference in sqlite3ExprCodeTarget() in expr.c, when the pInfo->aFunc struct pointer is set to 0. This may happen when rewriting a query for window functions, if the rewrite changes the depth of TK_AGG_FUNCTION nodes. An attacker would need to have a level of access that allows him to write particular SQL expressions to trigger this flaw, leading to a denial of service. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4396 https://access.redhat.com/errata/RHSA-2021:4396 |