DEBIAN-CVE-2021-45346

Source
https://security-tracker.debian.org/tracker/CVE-2021-45346
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45346.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2021-45346
Upstream
Published
2022-02-14T19:15:07.793Z
Modified
2026-03-11T07:33:44.635255Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.

References

Affected packages

Debian:11 / sqlite3

Package

Name
sqlite3
Purl
pkg:deb/debian/sqlite3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.34.1-3
3.34.1-3+deb11u1
3.35.5-1
3.36.0-1
3.36.0-2
3.37.0-1
3.37.0-2
3.37.1-1
3.37.2-1
3.37.2-2
3.38.0-1
3.38.1-1
3.38.2-1
3.38.3-1
3.38.5-1
3.39.0-1
3.39.0-2
3.39.0-3
3.39.1-1
3.39.2-1
3.39.3-1
3.39.4-1
3.40.0-1
3.40.0-2
3.40.1-1
3.40.1-2
3.42.0-1
3.43.0-1
3.43.1-1
3.43.2-1
3.44.0-1
3.44.2-1
3.45.0-1
3.45.1-1
3.45.2-1
3.45.3-1
3.45.3-2~exp1
3.46.0-1
3.46.1-1
3.46.1-2~exp
3.46.1-2
3.46.1-3
3.46.1-4
3.46.1-5
3.46.1-6
3.46.1-7
3.46.1-8
3.46.1-9

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45346.json"

Debian:12 / sqlite3

Package

Name
sqlite3
Purl
pkg:deb/debian/sqlite3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.40.1-2
3.40.1-2+deb12u1
3.40.1-2+deb12u2
3.42.0-1
3.43.0-1
3.43.1-1
3.43.2-1
3.44.0-1
3.44.2-1
3.45.0-1
3.45.1-1
3.45.2-1
3.45.3-1
3.45.3-2~exp1
3.46.0-1
3.46.1-1
3.46.1-2~exp
3.46.1-2
3.46.1-3
3.46.1-4
3.46.1-5
3.46.1-6
3.46.1-7
3.46.1-8
3.46.1-9

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45346.json"

Debian:13 / sqlite3

Package

Name
sqlite3
Purl
pkg:deb/debian/sqlite3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.46.1-7
3.46.1-7+deb13u1
3.46.1-8
3.46.1-9

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45346.json"

Debian:14 / sqlite3

Package

Name
sqlite3
Purl
pkg:deb/debian/sqlite3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.46.1-7
3.46.1-8
3.46.1-9

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2021-45346.json"