CVE-2017-10989

The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://marc.info/?l=sqlite-users&m=149933696214713&w=2 Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/99502 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039427
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405 Permissions Required
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://sqlite.org/src/info/66de6f4a Issue Tracking Patch Vendor Advisory
https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26 Patch Vendor Advisory
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://marc.info/?l=sqlite-users&m=149933696214713&w=2 Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/99502 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039427
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405 Permissions Required
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://sqlite.org/src/info/66de6f4a Issue Tracking Patch Vendor Advisory
https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26 Patch Vendor Advisory
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
Configurations

Configuration 1 (hide)

cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:06

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html - () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html -
References () http://marc.info/?l=sqlite-users&m=149933696214713&w=2 - Patch, Third Party Advisory () http://marc.info/?l=sqlite-users&m=149933696214713&w=2 - Patch, Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -
References () http://www.securityfocus.com/bid/99502 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99502 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039427 - () http://www.securitytracker.com/id/1039427 -
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405 - Permissions Required () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405 - Permissions Required
References () https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 - Issue Tracking, Patch, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html - () https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html -
References () https://sqlite.org/src/info/66de6f4a - Issue Tracking, Patch, Vendor Advisory () https://sqlite.org/src/info/66de6f4a - Issue Tracking, Patch, Vendor Advisory
References () https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26 - Patch, Vendor Advisory () https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26 - Patch, Vendor Advisory
References () https://support.apple.com/HT208112 - () https://support.apple.com/HT208112 -
References () https://support.apple.com/HT208113 - () https://support.apple.com/HT208113 -
References () https://support.apple.com/HT208115 - () https://support.apple.com/HT208115 -
References () https://support.apple.com/HT208144 - () https://support.apple.com/HT208144 -
References () https://usn.ubuntu.com/4019-1/ - () https://usn.ubuntu.com/4019-1/ -
References () https://usn.ubuntu.com/4019-2/ - () https://usn.ubuntu.com/4019-2/ -

Information

Published : 2017-07-07 12:29

Updated : 2024-11-21 03:06


NVD link : CVE-2017-10989

Mitre link : CVE-2017-10989

CVE.ORG link : CVE-2017-10989


JSON object : View

Products Affected

sqlite

  • sqlite
CWE
CWE-125

Out-of-bounds Read