First published: Mon Dec 25 2023(Updated: )
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sqlite3 | <3.31.1-4ubuntu0.6 | 3.31.1-4ubuntu0.6 |
ubuntu/sqlite3 | <3.37.2-2ubuntu0.3 | 3.37.2-2ubuntu0.3 |
ubuntu/sqlite3 | <3.40.1-1ubuntu0.1 | 3.40.1-1ubuntu0.1 |
ubuntu/sqlite3 | <3.42.0-1ubuntu0.1 | 3.42.0-1ubuntu0.1 |
ubuntu/sqlite3 | <3.44.2-1 | 3.44.2-1 |
SQLite SQLite | <=3.43.0 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
debian/sqlite3 | <=3.27.2-3+deb10u1<=3.27.2-3+deb10u2<=3.34.1-3<=3.40.1-2 | 3.45.1-1 3.45.3-1 |
<=3.43.0 | ||
=38 | ||
=39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.