First published: Wed Sep 25 2024(Updated: )
sqlite-vec v0.1.1 was discovered to contain a heap buffer overflow via the npy_token_next function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rust/sqlite-vec | <0.1.3 | 0.1.3 |
rubygems/sqlite-vec | <0.1.3 | 0.1.3 |
npm/sqlite-vec | <0.1.3 | 0.1.3 |
pip/sqlite-vec | <0.1.3 | 0.1.3 |
SQLite | =0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46488 is classified as a high severity vulnerability due to its potential to cause Denial of Service (DoS).
To fix CVE-2024-46488, upgrade to version 0.1.3 or higher of the sqlite-vec package.
CVE-2024-46488 affects versions of sqlite-vec prior to 0.1.3 across multiple package managers including rust, rubygems, npm, and pip.
CVE-2024-46488 involves a heap buffer overflow vulnerability found in the npy_token_next function.
Exploiting CVE-2024-46488 can lead to Denial of Service (DoS) through the use of crafted files.