First published: Thu Oct 12 2023(Updated: )
A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sqlite | <3.43.2 | 3.43.2 |
SQLite JDBC | >=3.43.0<3.43.2 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Fedora EPEL | =8.0 | |
Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0232 is considered a high severity vulnerability due to its potential to cause application crashes and denial of service.
To fix CVE-2024-0232, update SQLite to version 3.43.2 or later.
CVE-2024-0232 affects SQLite versions prior to 3.43.2, particularly on Red Hat Enterprise Linux 8.0, Red Hat Enterprise Linux 9.0, and Fedora 39.
CVE-2024-0232 is a heap use-after-free issue identified in the jsonParseAddNodeArray() function of SQLite.
CVE-2024-0232 requires local access for exploitation as it involves the victim passing malicious input to the application.