First published: Mon Dec 25 2023(Updated: )
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sqlite3 | <=3.34.1-3<=3.40.1-2 | 3.34.1-3+deb11u1 3.46.0-1 3.46.1-1 |
SQLite | <=3.43.0 | |
Fedora | =38 | |
Fedora | =39 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7104 is classified as a critical vulnerability.
To mitigate CVE-2023-7104, upgrade SQLite to version 3.43.0 or later.
CVE-2023-7104 affects the SQLite3 function sessionReadRecord in the file ext/session/sqlite3session.c.
CVE-2023-7104 is a heap-based buffer overflow vulnerability.
SQLite versions up to 3.43.0 are vulnerable to CVE-2023-7104.