{"id":"CVE-2024-0232","details":"A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.","aliases":["BIT-sqlite-2024-0232"],"modified":"2026-03-14T14:55:00.497412Z","published":"2024-01-16T14:15:48.327Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-0232"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240315-0007/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243754"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sqlite/sqlite","events":[{"introduced":"995f96f8e11036c909b1dec14049999bc23421c6"},{"fixed":"43fa051ec7c5a7d89e1f5f541a5cd34d53e07422"}],"database_specific":{"versions":[{"introduced":"3.43.0"},{"fixed":"3.43.2"}]}}],"versions":["version-3.43.0","version-3.43.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0232.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}