First published: Thu Jan 09 2020(Updated: )
multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2019-19880">CVE-2019-19880</a>. Upstream commit: <a href="https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089">https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SQLite JDBC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1789364 is classified as a medium risk due to the potential for mishandled errors during parsing.
To fix REDHAT-BUG-1789364, upgrade to the latest version of SQLite that addresses this vulnerability.
REDHAT-BUG-1789364 is caused by an incomplete fix for a prior vulnerability in SQLite, leading to improper error handling.
SQLite 3.30.1 is specifically mentioned as having the vulnerability associated with REDHAT-BUG-1789364.
Yes, REDHAT-BUG-1789364 is related to CVE-2019-19880, as it stems from an incomplete fix for that vulnerability.