UBUNTU-CVE-2020-9794

Source
https://ubuntu.com/security/CVE-2020-9794
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-9794.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-9794
Upstream
Published
2020-06-09T17:15:00Z
Modified
2026-04-22T12:44:06.789801Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A malicious application may cause a denial of service or potentially disclose memory contents.

References

Affected packages

Ubuntu:16.04:LTS / sqlite

Package

Name
sqlite
Purl
pkg:deb/ubuntu/sqlite@2.8.17-12fakesync1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.8.17-12fakesync1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.8.17-12fakesync1",
            "binary_name": "libsqlite-tcl"
        },
        {
            "binary_version": "2.8.17-12fakesync1",
            "binary_name": "libsqlite0"
        },
        {
            "binary_version": "2.8.17-12fakesync1",
            "binary_name": "sqlite"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-9794.json"