CVE-2020-13631

Name
CVE-2020-13631
Description
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Permissions Required https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
Patch https://sqlite.org/src/info/eca0ba2cf4c0fdf7
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
Third Party Advisory https://security.netapp.com/advisory/ntap-20200608-0002/
UBUNTU https://usn.ubuntu.com/4394-1/
MISC https://www.oracle.com/security-alerts/cpujul2020.html
GENTOO https://security.gentoo.org/glsa/202007-26
FREEBSD https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
MISC https://www.oracle.com/security-alerts/cpuoct2020.html
CONFIRM https://support.apple.com/kb/HT211931
CONFIRM https://support.apple.com/kb/HT211844
CONFIRM https://support.apple.com/kb/HT211850
CONFIRM https://support.apple.com/kb/HT211843
CONFIRM https://support.apple.com/kb/HT211952
FULLDISC http://seclists.org/fulldisclosure/2020/Nov/19
FULLDISC http://seclists.org/fulldisclosure/2020/Nov/22
FULLDISC http://seclists.org/fulldisclosure/2020/Nov/20
CONFIRM https://support.apple.com/kb/HT211935
FULLDISC http://seclists.org/fulldisclosure/2020/Dec/32

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:* sqlite >= None < 3.32.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
sqlite 3.11-main 3.30.1-r2 Carlo Landmeter <clandmeter@gmail.com> possibly vulnerable
sqlite 3.10-main 3.28.0-r3 Carlo Landmeter <clandmeter@gmail.com> possibly vulnerable