{"id":"CVE-2020-11655","details":"SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.","aliases":["BIT-sqlite-2020-11655"],"modified":"2026-04-10T04:21:50.584364Z","published":"2020-04-09T03:15:11.363Z","related":["CGA-m4qh-c5gh-j8c6","MGASA-2021-0303"],"references":[{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-26"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4394-1/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11"},{"type":"FIX","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"type":"EVIDENCE","url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"introduced":"0"},{"last_affected":"527c12ed611f3fe072c3043734319edb2c733099"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"ee4455a33b10f1b1886044322e4893f587b319ed"},{"introduced":"0"},{"last_affected":"ee4455a33b10f1b1886044322e4893f587b319ed"},{"introduced":"0"},{"last_affected":"ea1efa9822d81044b726aab20c857d5e1b7e046a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"9.0"},{"introduced":"8.0.0"},{"last_affected":"8.0.22"},{"introduced":"0"},{"last_affected":"8.0.22"},{"introduced":"0"},{"last_affected":"8.1"}]}},{"type":"GIT","repo":"https://github.com/sqlite/sqlite","events":[{"introduced":"0"},{"last_affected":"562fd18b9dc27216191c0a6477bba9b175f7f0d2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.31.1"}]}}],"versions":["mysql-3.23.22-beta","mysql-3.23.28-gamma","mysql-3.23.30-gamma","mysql-3.23.31","mysql-3.23.32","mysql-3.23.33","mysql-3.23.36","mysql-4.0.2","mysql-4.0.4","mysql-5.1.4","mysql-8.0.0","mysql-8.0.22","mysql-8.1.0","mysql-9.0.0","mysql-9.0.0-release","mysql-cluster-8.0.22","mysql-cluster-8.1.0","mysql-cluster-9.0.0","version-1.0","version-1.0.1","version-1.0.10","version-1.0.12","version-1.0.13","version-1.0.14","version-1.0.15","version-1.0.16","version-1.0.17","version-1.0.18","version-1.0.19","version-1.0.20","version-1.0.21","version-1.0.22","version-1.0.23","version-1.0.24","version-1.0.25","version-1.0.26","version-1.0.27","version-1.0.28","version-1.0.29","version-1.0.3","version-1.0.30","version-1.0.31","version-1.0.32","version-1.0.4","version-1.0.5","version-1.0.8","version-1.0.9","version-2.0.0","version-2.0.1","version-2.0.2","version-2.0.3","version-2.0.4","version-2.0.5","version-2.0.6","version-2.0.7","version-2.0.8","version-2.1.0","version-2.1.1","version-2.1.2","version-2.1.3","version-2.1.4","version-2.1.5","version-2.1.6","version-2.1.7","version-2.2.0","version-2.2.1","version-2.2.2","version-2.2.3","version-2.2.4","version-2.2.5","version-2.3.0","version-2.3.1","version-2.3.2","version-2.3.3","version-2.4.0","version-2.4.1","version-2.4.10","version-2.4.11","version-2.4.12","version-2.4.2","version-2.4.3","version-2.4.4","version-2.4.5","version-2.4.6","version-2.4.7","version-2.4.8","version-2.4.9","version-2.5.0","version-2.5.1","version-2.5.2","version-2.5.3","version-2.5.4","version-2.5.5","version-2.5.6","version-2.6.0","version-2.6.1","version-2.6.2","version-2.6.3","version-2.7.0","version-2.7.1","version-2.7.2","version-2.7.3","version-2.7.4","version-2.7.5","version-2.7.6","version-2.8.0","version-2.8.1","version-2.8.10","version-2.8.11","version-2.8.12","version-2.8.13","version-2.8.2","version-2.8.3","version-2.8.4","version-2.8.5","version-2.8.6","version-2.8.7","version-2.8.8","version-2.8.9","version-3.0.0","version-3.0.1","version-3.0.2","version-3.0.3","version-3.0.4","version-3.0.5","version-3.0.6","version-3.0.7","version-3.0.8","version-3.1.0","version-3.1.1","version-3.1.2","version-3.1.3","version-3.1.3.1","version-3.1.4","version-3.1.5","version-3.1.6","version-3.10.0","version-3.11.0","version-3.12.0","version-3.13.0","version-3.14.0","version-3.15.0","version-3.16.0","version-3.2.0","version-3.2.1","version-3.2.2","version-3.2.3","version-3.2.4","version-3.2.5","version-3.2.6","version-3.2.7","version-3.22.0","version-3.23.0","version-3.23.1","version-3.24.0","version-3.25.0","version-3.26.0","version-3.27.0","version-3.28.0","version-3.29.0","version-3.3.0","version-3.3.1","version-3.3.10","version-3.3.11","version-3.3.12","version-3.3.13","version-3.3.14","version-3.3.15","version-3.3.16","version-3.3.17","version-3.3.2","version-3.3.3","version-3.3.4","version-3.3.5","version-3.3.6","version-3.3.7","version-3.3.8","version-3.3.9","version-3.30.0","version-3.31.0","version-3.31.1","version-3.4.0","version-3.4.1","version-3.4.2","version-3.5.0","version-3.5.1","version-3.5.2","version-3.5.3","version-3.5.4","version-3.5.5","version-3.5.6","version-3.5.7","version-3.5.8","version-3.5.9","version-3.6.0","version-3.6.1","version-3.6.10","version-3.6.11","version-3.6.12","version-3.6.13","version-3.6.14","version-3.6.15","version-3.6.16","version-3.6.17","version-3.6.18","version-3.6.19","version-3.6.2","version-3.6.20","version-3.6.21","version-3.6.22","version-3.6.23","version-3.6.3","version-3.6.4","version-3.6.5","version-3.6.6","version-3.6.7","version-3.6.8","version-3.6.9","version-3.7.0","version-3.7.1","version-3.7.10","version-3.7.11","version-3.7.12","version-3.7.12.1","version-3.7.13","version-3.7.14","version-3.7.15","version-3.7.16","version-3.7.16.1","version-3.7.17","version-3.7.2","version-3.7.3","version-3.7.4","version-3.7.5","version-3.7.6","version-3.7.6.1","version-3.7.7","version-3.7.8","version-3.7.9","version-3.8.0","version-3.8.1","version-3.8.10","version-3.8.10.1","version-3.8.11","version-3.8.11.1","version-3.8.2","version-3.8.3","version-3.8.4","version-3.8.4.1","version-3.8.5","version-3.8.6","version-3.8.7","version-3.8.8","version-3.8.9","version-3.9.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"12.0.0"},{"last_affected":"12.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.2"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"17.1"}]},{"events":[{"introduced":"0"},{"last_affected":"17.2"}]},{"events":[{"introduced":"0"},{"last_affected":"17.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.5.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.5.5"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]},{"events":[{"introduced":"0"},{"fixed":"1.0.1.1"}]},{"events":[{"introduced":"0"},{"fixed":"5.19.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11655.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}