A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sqlite | Sqlite | 3.35.1 (including) | 3.35.1 (including) |
Sqlite | Sqlite | 3.37.0 (including) | 3.37.0 (including) |
Sqlite | Ubuntu | bionic | * |
Sqlite | Ubuntu | esm-apps/bionic | * |
Sqlite | Ubuntu | esm-apps/focal | * |
Sqlite | Ubuntu | esm-apps/jammy | * |
Sqlite | Ubuntu | esm-apps/xenial | * |
Sqlite | Ubuntu | esm-infra-legacy/trusty | * |
Sqlite | Ubuntu | focal | * |
Sqlite | Ubuntu | impish | * |
Sqlite | Ubuntu | jammy | * |
Sqlite | Ubuntu | kinetic | * |
Sqlite | Ubuntu | trusty | * |
Sqlite | Ubuntu | trusty/esm | * |
Sqlite | Ubuntu | upstream | * |
Sqlite | Ubuntu | xenial | * |
Sqlite3 | Ubuntu | bionic | * |
Sqlite3 | Ubuntu | devel | * |
Sqlite3 | Ubuntu | esm-infra-legacy/trusty | * |
Sqlite3 | Ubuntu | esm-infra/bionic | * |
Sqlite3 | Ubuntu | esm-infra/xenial | * |
Sqlite3 | Ubuntu | focal | * |
Sqlite3 | Ubuntu | impish | * |
Sqlite3 | Ubuntu | jammy | * |
Sqlite3 | Ubuntu | kinetic | * |
Sqlite3 | Ubuntu | lunar | * |
Sqlite3 | Ubuntu | trusty | * |
Sqlite3 | Ubuntu | trusty/esm | * |
Sqlite3 | Ubuntu | upstream | * |
Sqlite3 | Ubuntu | xenial | * |