First published: Wed Jan 15 2020(Updated: )
selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error. Reference and upstream commit: <a href="https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387">https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SQLite JDBC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1791313 is categorized as a moderate severity vulnerability due to its potential for causing unintended behavior in SQLite.
To fix REDHAT-BUG-1791313, update to the latest version of SQLite where this issue has been resolved.
The vulnerability REDHAT-BUG-1791313 affects SQLite versions prior to the fix in SQLIte 3.30.1.
REDHAT-BUG-1791313 impacts the selectExpander function in select.c, causing it to continue unwinding the WITH stack even after encountering a parsing error.
As of now, there are no publicly disclosed exploits specifically targeting REDHAT-BUG-1791313.