CVE-2019-5018

Priority
Description
An exploitable use after free vulnerability exists in the window function
functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause
a use after free vulnerability, potentially resulting in remote code
execution. An attacker can send a malicious SQL command to trigger this
vulnerability.
Notes
leosilvacode was introduced in 3.25.0
mdeslaurneed to be able to execute arbitrary SQL commands to trigger
this issue.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 19.04 (Disco Dingo):released (3.27.2-2ubuntu0.2)
Ubuntu 19.10 (Eoan Ermine):released (3.27.2-3)
Ubuntu 20.04 (Focal Fossa):released (3.27.2-3)
Patches:
Upstream:https://www.sqlite.org/src/vpatch?from=1ae70ad2ffd36c27&to=1e16d3e8fc60d39c
More Information

Updated: 2019-12-05 21:10:08 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)