First published: Sat Jun 27 2020(Updated: )
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
Credit: CVE-2020-15358 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sqlite | <3.32.3 | 3.32.3 |
IBM Security Verify Access | <=10.0.0 | |
ubuntu/sqlite3 | <3.31.1-4ubuntu0.2 | 3.31.1-4ubuntu0.2 |
debian/sqlite3 | 3.34.1-3 3.40.1-2 3.46.0-1 | |
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.0 | 14.0 |
Android | ||
Apple macOS | <11.2 | 11.2 |
macOS Catalina | ||
macOS Mojave | ||
SQLite | <3.32.3 | |
Ubuntu Linux | =20.04 | |
Apple iCloud for Windows | <7.21 | |
Apple iOS, iPadOS, and watchOS | <14.0 | |
iOS | <14.0 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.0 | |
Apple iOS, iPadOS, and watchOS | <7.0 | |
oracle communications Cloud native core policy | =1.14.0 | |
Sun iPlanet Messaging Server | =8.1 | |
oracle communications network charging and control | =6.0.1 | |
oracle communications network charging and control | =12.0.2 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
oracle hyperion infrastructure technology | =11.1.2.4 | |
MySQL | <=8.0.22 | |
Oracle Outside In Technology | =8.5.4 | |
Oracle Outside In Technology | =8.5.5 | |
siemens sinec infrastructure network services | <1.0.1.1 | |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <7.0 | 7.0 |
Apple iCloud | <7.21 | 7.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2020-15358.
The title of this vulnerability is 'SQLite. Multiple issues were addressed with improved checks.'
The vulnerabilities were addressed by updating SQLite to version 3.32.3.
The affected software products include macOS Big Sur, watchOS, iOS, iPadOS, iCloud for Windows, and tvOS.
You can find more information about this vulnerability on the Apple support website.