CVE-2019-5018

Priority
Description
An exploitable use after free vulnerability exists in the window function
functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause
a use after free vulnerability, potentially resulting in remote code
execution. An attacker can send a malicious SQL command to trigger this
vulnerability.
Notes
leosilvacode was introduced in 3.25.0
mdeslaurneed to be able to execute arbitrary SQL commands to trigger
this issue.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):not-affected
Ubuntu 20.04 LTS (Focal Fossa):released (3.27.2-3)
Patches:
Upstream:https://www.sqlite.org/src/vpatch?from=1ae70ad2ffd36c27&to=1e16d3e8fc60d39c
More Information

Updated: 2020-07-28 20:07:29 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)