Bug 2256194 (CVE-2023-7104)
Summary: | CVE-2023-7104 sqlite: heap-buffer-overflow at sessionfuzz | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | gsuckevi |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2256197, 2256198, 2256196, 2256199, 2256200, 2256201, 2256202, 2256203, 2256204, 2256205 | ||
Bug Blocks: | 2256195 |
Description
Avinash Hanwate
2023-12-29 13:37:37 UTC
Created chromium tracking bugs for this issue: Affects: epel-all [bug 2256196] Affects: fedora-all [bug 2256199] Created mingw-sqlite tracking bugs for this issue: Affects: fedora-all [bug 2256200] Created qt5-qtwebengine tracking bugs for this issue: Affects: epel-all [bug 2256197] Affects: fedora-all [bug 2256201] Created qt6-qtwebengine tracking bugs for this issue: Affects: fedora-all [bug 2256202] Created sqlite tracking bugs for this issue: Affects: fedora-all [bug 2256203] Created sqlite2 tracking bugs for this issue: Affects: epel-all [bug 2256198] Affects: fedora-all [bug 2256204] Created tdlib tracking bugs for this issue: Affects: fedora-all [bug 2256205] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0253 https://access.redhat.com/errata/RHSA-2024:0253 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:0465 https://access.redhat.com/errata/RHSA-2024:0465 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:0589 https://access.redhat.com/errata/RHSA-2024:0589 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:1081 https://access.redhat.com/errata/RHSA-2024:1081 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:1107 https://access.redhat.com/errata/RHSA-2024:1107 |