Unrated severityNVD Advisory· Published Feb 21, 2020· Updated Aug 4, 2024
CVE-2020-9327
CVE-2020-9327
Description
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
Affected products
34- SQLite/SQLitedescription
- osv-coords33 versionspkg:bitnami/sqlitepkg:rpm/opensuse/sqlite3&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/sqlite3&distro=openSUSE%20Leap%2015.3pkg:rpm/suse/sqlite3&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/sqlite3&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/sqlite3&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/sqlite3&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/sqlite3&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/sqlite3&distro=SUSE%20Manager%20Server%204.0pkg:rpm/suse/sqlite3&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/sqlite3&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/sqlite3&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/sqlite3&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
>= 3.31.1, < 3.31.2+ 32 more
- (no CPE)range: >= 3.31.1, < 3.31.2
- (no CPE)range: < 3.36.0-lp152.4.3.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-3.12.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
- (no CPE)range: < 3.36.0-9.18.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- security.gentoo.org/glsa/202003-16mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/4298-1/mitrevendor-advisoryx_refsource_UBUNTU
- cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfmitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20200313-0002/mitrex_refsource_CONFIRM
- www.oracle.com/security-alerts/cpuApr2021.htmlmitrex_refsource_MISC
- www.oracle.com/security-alerts/cpujan2021.htmlmitrex_refsource_MISC
- www.oracle.com/security-alerts/cpujul2020.htmlmitrex_refsource_MISC
- www.oracle.com/security-alerts/cpuoct2020.htmlmitrex_refsource_MISC
- www.sqlite.org/cgi/src/info/4374860b29383380mitrex_refsource_MISC
- www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56emitrex_refsource_MISC
- www.sqlite.org/cgi/src/info/abc473fb8fb99900mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.