From d94547d54ebe03dd72417b7d81e3f1f261e2cb06 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fernando=20Apestegu=C3=ADa?= Date: Sun, 29 Sep 2024 19:08:50 +0200 Subject: [PATCH] security/vuxml: Add sqlite use after free vulnerability CVE-2024-0232 * Base Score: 5.5 MEDIUM * Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H --- security/vuxml/vuln/2024.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index f74fbd616725..827aae16c351 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,33 @@ + + sqlite -- use-after-free bug in jsonparseaddnodearray + + + sqlite + 3.43.2 + + + + +

secalert@redhat.com reports:

+
+

A heap use-after-free issue has been identified in SQLite in the + jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a + local attacker to leverage a victim to pass specially crafted + malicious input to the application, potentially causing a crash and + leading to a denial of service.

+
+ +
+ + CVE-2024-0232 + https://nvd.nist.gov/vuln/detail/CVE-2024-0232 + + + 2024-01-16 + 2024-09-29 + +
+ cups-filters -- remote code execution