An out of bounds read flaw was found in the SQLite component of the Chromium browser.
Created chromium tracking bugs for this issue:
Affects: epel-7 [bug 1801839]
Affects: fedora-all [bug 1801838]
While the chromium bug is not public yet, its id leads us to this:
which further leads us to upstream commit:
This was included in sqlite upstream version 3.31.0.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 6 Supplementary
Via RHSA-2020:0514 https://access.redhat.com/errata/RHSA-2020:0514
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):
The out-of-bounds read flaw lies in function propagateConstantExprRewrite() in src/select.c, which is part of the WHERE-clause constant propagation optimization.
The initial implementation of this feature was introduced in SQLite upstream version 3.25.0 with commit https://github.com/sqlite/sqlite/commit/660ee55663fb8aa26a7ebd764ec5c94440bcd62f.
This flaw did not affect the versions of SQLite as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the WHERE-clause constant propagation optimization, which was introduced in a later version of the package.
Created mingw-sqlite tracking bugs for this issue:
Affects: fedora-all [bug 1805307]
Created sqlite tracking bugs for this issue:
Affects: fedora-all [bug 1805306]