CVE-2020-11656

Name
CVE-2020-11656
Description
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://www3.sqlite.org/cgi/src/info/b64674919f673602
Patch https://www.sqlite.org/src/info/d09f8c3621d5f7f8
Third Party Advisory https://security.netapp.com/advisory/ntap-20200416-0001/
Third Party Advisory https://www.oracle.com/security-alerts/cpujul2020.html
Third Party Advisory https://security.gentoo.org/glsa/202007-26
Third Party Advisory https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html
Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html
MISC https://www.oracle.com/security-alerts/cpuApr2021.html
CONFIRM https://www.tenable.com/security/tns-2021-14
Patch https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:* sqlite >= None <= 3.31.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
sqlite 3.11-main 3.30.1-r2 Carlo Landmeter <clandmeter@gmail.com> possibly vulnerable
sqlite 3.10-main 3.28.0-r3 Carlo Landmeter <clandmeter@gmail.com> possibly vulnerable