SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
https://www.synology.com/security/advisory/Synology_SA_18_61
https://www.sqlite.org/releaselog/3_25_3.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html
https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc
https://worthdoingbadly.com/sqlitebug/
https://usn.ubuntu.com/4019-2/
https://usn.ubuntu.com/4019-1/
https://support.apple.com/HT209451
https://support.apple.com/HT209450
https://support.apple.com/HT209448
https://support.apple.com/HT209447
https://support.apple.com/HT209446
https://support.apple.com/HT209443
https://sqlite.org/src/info/d44318f59044162e
https://sqlite.org/src/info/940f2adc8541a838
https://security.gentoo.org/glsa/201904-21
https://news.ycombinator.com/item?id=18685296
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html
https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e
https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
https://bugzilla.redhat.com/show_bug.cgi?id=1659677
https://bugzilla.redhat.com/show_bug.cgi?id=1659379
https://blade.tencent.com/magellan/index_en.html
https://access.redhat.com/articles/3758321
http://www.securityfocus.com/bid/106323
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html