Heap-based Buffer Overflow Affecting sqlite-libs package, versions <0:3.26.0-19.el8_9
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-SQLITELIBS-6140700
- published 30 Dec 2023
- disclosed 29 Dec 2023
Introduced: 29 Dec 2023
CVE-2023-7104 Open this link in a new tabHow to fix?
Upgrade Centos:8
sqlite-libs
to version 0:3.26.0-19.el8_9 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite-libs
package and not the sqlite-libs
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
References
- https://access.redhat.com/security/cve/CVE-2023-7104
- https://sqlite.org/forum/forumpost/5bcbf4571c
- https://sqlite.org/src/info/0e4e7a05c4204b47
- https://vuldb.com/?ctiid.248999
- https://vuldb.com/?id.248999
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
- https://security.netapp.com/advisory/ntap-20240112-0008/