CVE-2023-7104:
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue...
5.5
Basic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly names sessionReadRecord
in ext/session/sqlite3session.c
as the affected function. The provided SQLite commit link (https://sqlite.org/src/info/0e4e7a05c4204b47
) contains a patch for this file. Analyzing the diff from the fetched URL content shows that the changes are within a function that matches the structure and operations described for sessionReadRecord
. Specifically, a new conditional block if( (pIn->nData-pIn->iNext)<8 ){ rc = SQLITE_CORRUPT_BKPT; }else{ ... }
was added. This check prevents reading 8 bytes for SQLITE_INTEGER
or SQLITE_FLOAT
types if insufficient data remains in the input buffer pIn
. The commit comment also states: "Fix a buffer overread in the sessions extension that could occur when processing a corrupt changeset." This directly supports the identification of sessionReadRecord
as the vulnerable function where the overread could occur before the fix.