{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-20227","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-03T17:30:07.500Z","dateReserved":"2020-12-17T00:00:00.000Z","datePublished":"2021-03-23T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-10-31T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability."}],"affected":[{"vendor":"n/a","product":"sqlite","versions":[{"version":"sqlite 3.34.1","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886"},{"url":"https://www.sqlite.org/releaselog/3_34_1.html"},{"name":"GLSA-202103-04","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202103-04"},{"url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"url":"https://security.netapp.com/advisory/ntap-20210423-0010/"},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"name":"GLSA-202210-40","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202210-40"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-416","cweId":"CWE-416"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:30:07.500Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886","tags":["x_transferred"]},{"url":"https://www.sqlite.org/releaselog/3_34_1.html","tags":["x_transferred"]},{"name":"GLSA-202103-04","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202103-04"},{"url":"https://www.oracle.com/security-alerts/cpuApr2021.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20210423-0010/","tags":["x_transferred"]},{"url":"https://www.oracle.com//security-alerts/cpujul2021.html","tags":["x_transferred"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2021.html","tags":["x_transferred"]},{"name":"GLSA-202210-40","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202210-40"}]}]}}