Bug 1824174 (CVE-2020-11655) - CVE-2020-11655 sqlite: malformed window-function query leads to DoS
Summary: CVE-2020-11655 sqlite: malformed window-function query leads to DoS
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-11655
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1824175 1824176 1824177 1824178 1840140
Blocks: 1824191
TreeView+ depends on / blocked
 
Reported: 2020-04-15 13:45 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-02-16 20:15 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-04-17 04:59:43 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-04-15 13:45:47 UTC
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.

Reference:
https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c

Upstream commit:
https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11

Comment 1 Guilherme de Almeida Suckevicz 2020-04-15 13:46:21 UTC
Created mingw-sqlite tracking bugs for this issue:

Affects: fedora-all [bug 1824176]


Created sqlite2 tracking bugs for this issue:

Affects: epel-all [bug 1824175]
Affects: fedora-all [bug 1824177]


Created sqlite3 tracking bugs for this issue:

Affects: fedora-all [bug 1824178]

Comment 2 Robert Scheck 2020-04-15 14:54:42 UTC
Why do I still get auto-Cc-ed for SQLite security flaws? I'm no longer a package maintainer of sqlite2 (for quite some time already), nor am I (co-)maintaining sqlite itself.

Comment 3 Guilherme de Almeida Suckevicz 2020-04-15 19:01:12 UTC
In reply to comment #2:
> Why do I still get auto-Cc-ed for SQLite security flaws? I'm no longer a
> package maintainer of sqlite2 (for quite some time already), nor am I
> (co-)maintaining sqlite itself.

This is because you still are the default assignee for the sqlite2 component in Fedora EPEL.

Comment 4 Huzaifa S. Sidhpurwala 2020-04-17 04:58:08 UTC
It seems like this issue existed since sqlite-3.25.0, when window function (https://www.sqlite.org/windowfunctions.html)  was added, but it lead to segmentation fault after https://www3.sqlite.org/cgi/src/info/712e47714863a8ed was committed, which could result in denial of service. This commit is a part of sqlite-3.30 release.

Therefore previous versions are not vulnerable to this flaw.

Comment 5 Huzaifa S. Sidhpurwala 2020-04-17 04:58:12 UTC
Statement:

It seems like this issue existed since sqlite-3.25.0, when window function (https://www.sqlite.org/windowfunctions.html)  was added, but it lead to segmentation fault after https://www3.sqlite.org/cgi/src/info/712e47714863a8ed was committed, which could result in denial of service. This commit is a part of sqlite-3.30 release.

Therefore previous versions are not vulnerable to this flaw.

Comment 6 Guilherme de Almeida Suckevicz 2020-05-26 13:04:09 UTC
Created sqlite tracking bugs for this issue:

Affects: fedora-all [bug 1840140]


Note You need to log in before you can comment on or make changes to this bug.