Описание
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | DNE | |
| esm-apps/bionic | ignored | vendor disputes CVE |
| esm-apps/focal | ignored | vendor disputes CVE |
| esm-apps/jammy | ignored | vendor disputes CVE |
| esm-apps/xenial | ignored | vendor disputes CVE |
| esm-infra-legacy/trusty | ignored | vendor disputes CVE |
| focal | ignored | end of standard support, was ignored [vendor disputes CVE] |
| impish | ignored | end of life |
| jammy | ignored | vendor disputes CVE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | ignored | vendor disputes CVE |
| esm-infra-legacy/trusty | ignored | vendor disputes CVE |
| esm-infra/bionic | ignored | vendor disputes CVE |
| esm-infra/focal | ignored | vendor disputes CVE |
| esm-infra/xenial | ignored | vendor disputes CVE |
| focal | ignored | end of standard support, was ignored [vendor disputes CVE] |
| impish | ignored | end of life |
| jammy | ignored | vendor disputes CVE |
| kinetic | ignored | end of life, was ignored [vendor disputes CVE] |
Показывать по
4 Medium
CVSS2
4.3 Medium
CVSS3
Связанные уязвимости
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 an ...
A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicous user obtain sensitive information..
4 Medium
CVSS2
4.3 Medium
CVSS3