CVE Vulnerabilities

CVE-2021-45346

Missing Release of Memory after Effective Lifetime

Published: Feb 14, 2022 | Modified: May 17, 2024
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
4.3 LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.

Weakness

The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.

Affected Software

Name Vendor Start Version End Version
Sqlite Sqlite 3.35.1 (including) 3.35.1 (including)
Sqlite Sqlite 3.37.0 (including) 3.37.0 (including)
Sqlite Ubuntu bionic *
Sqlite Ubuntu esm-apps/bionic *
Sqlite Ubuntu esm-apps/focal *
Sqlite Ubuntu esm-apps/jammy *
Sqlite Ubuntu esm-apps/xenial *
Sqlite Ubuntu esm-infra-legacy/trusty *
Sqlite Ubuntu focal *
Sqlite Ubuntu impish *
Sqlite Ubuntu jammy *
Sqlite Ubuntu kinetic *
Sqlite Ubuntu trusty *
Sqlite Ubuntu trusty/esm *
Sqlite Ubuntu upstream *
Sqlite Ubuntu xenial *
Sqlite3 Ubuntu bionic *
Sqlite3 Ubuntu devel *
Sqlite3 Ubuntu esm-infra-legacy/trusty *
Sqlite3 Ubuntu esm-infra/bionic *
Sqlite3 Ubuntu esm-infra/xenial *
Sqlite3 Ubuntu focal *
Sqlite3 Ubuntu impish *
Sqlite3 Ubuntu jammy *
Sqlite3 Ubuntu kinetic *
Sqlite3 Ubuntu lunar *
Sqlite3 Ubuntu trusty *
Sqlite3 Ubuntu trusty/esm *
Sqlite3 Ubuntu upstream *
Sqlite3 Ubuntu xenial *

Potential Mitigations

  • Choose a language or tool that provides automatic memory management, or makes manual memory management less error-prone.
  • For example, glibc in Linux provides protection against free of invalid pointers.
  • When using Xcode to target OS X or iOS, enable automatic reference counting (ARC) [REF-391].
  • To help correctly and consistently manage memory when programming in C++, consider using a smart pointer class such as std::auto_ptr (defined by ISO/IEC ISO/IEC 14882:2003), std::shared_ptr and std::unique_ptr (specified by an upcoming revision of the C++ standard, informally referred to as C++ 1x), or equivalent solutions such as Boost.

References