CVE Vulnerabilities

CVE-2020-11655

Improper Initialization

Published: Apr 09, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo objects initialization is mishandled.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

Name Vendor Start Version End Version
Sqlite Sqlite * 3.31.1 (including)
Red Hat Openshift Data Foundation 4.19 RedHat odf4/cephcsi-rhel9:sha256:a4021d2130cfe6a04c7ff23547239c5114d87ab6db8b630ccff025557a2b686f *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/cephcsi-rhel9-operator:sha256:df1eee04994a4cb4e0912dcceeb163cbb5eb991e00279e32f59f5bd10870e027 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/mcg-core-rhel9:sha256:572faf6e2631e5dbb27d305c04b1c290f85282fc42013d4a8922b05065b1d69e *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/mcg-rhel9-operator:sha256:c0925c14fef769a74cefbf902659aefecea7aa6241f1281ff2f14712dd356747 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/ocs-client-console-rhel9:sha256:c9c249f77da5494a08151d90211799f46c501a136c63bdf5fab8528033c1a078 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/ocs-client-rhel9-operator:sha256:cab6cc6254d2226ea5ad6e7ca0b2ef445912983bda02612788a822cea77d50a9 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/ocs-metrics-exporter-rhel9:sha256:3e281be3ee1669685cc79a689b0f78c5372ee2595e845e40909389f92a5e372d *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/ocs-rhel9-operator:sha256:d244986c3c70c573757e110c4b0206afdefa90de95649cbe415282d73efff9e4 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-cli-rhel9:sha256:b4b2fe4c505060bac1710c73e699ed13b0a5fea32e1ba16166f929fb8cceba33 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-cloudnative-pg-rhel9-operator:sha256:b9c8f6ffca5a91d1184ef803bb4db14770cb35d305feb168412fa3a36c440d10 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-console-rhel9:sha256:32aeeae377a7ca1463af2a9f64c069d2c02ad1340035d3ea4960518fa3d4db48 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-cosi-sidecar-rhel9:sha256:3a11acadec7fa0b7d7409bf1beb0595a408e6de3d4a4a4cee3897f4876f847b0 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-csi-addons-rhel9-operator:sha256:892a0598e91d1cf7ca888ac4a4613a394c2b65233a68d87308744411f797e1ac *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-csi-addons-sidecar-rhel9:sha256:c2d13f3e165b09aa7bb21cdba8fd9f1f30fbc53ca50c212f1528ee3f84675b8a *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-multicluster-console-rhel9:sha256:124c052e9e0ce1e51f31f5f5b5e0d5d07a3bfcd28ccaee1d35f7bac03aa26cc0 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-multicluster-rhel9-operator:sha256:ddca72908fa5ddf3a22268f23429f6436de10dc6e9d2dbf4c0e01d13aa4bc724 *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-must-gather-rhel9:sha256:f9dac6ab62d6ef7786c1a47d64063f18e7af0c96a9144a01f2ca27382dbf773f *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odf-rhel9-operator:sha256:ff5b515653e8277b6a71153a990fc33e4a6fc10e226d37220438ebf99e7df98a *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/odr-rhel9-operator:sha256:dc5d9c9a06b8c5b0dc347d9b4465e2f26141d4f2be9cf7df36a862e942c3267a *
Red Hat Openshift Data Foundation 4.19 RedHat odf4/rook-ceph-rhel9-operator:sha256:3c15da58b7ff718d5dbf00fe344b6fa8d62d023bd18b6f6e708e9613fc95c594 *
Sqlite Ubuntu bionic *
Sqlite Ubuntu eoan *
Sqlite Ubuntu focal *
Sqlite Ubuntu groovy *
Sqlite Ubuntu hirsute *
Sqlite Ubuntu impish *
Sqlite Ubuntu kinetic *
Sqlite Ubuntu trusty *
Sqlite Ubuntu trusty/esm *
Sqlite Ubuntu upstream *
Sqlite Ubuntu xenial *
Sqlite3 Ubuntu eoan *
Sqlite3 Ubuntu esm-infra/focal *
Sqlite3 Ubuntu focal *
Sqlite3 Ubuntu trusty *
Sqlite3 Ubuntu upstream *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References