CVE-2022-46908 The advisory has been revoked - it doesn't affect any version of package sqlite3 Open this link in a new tab
Threat Intelligence
EPSS
0.05% (19th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-SQLITE3-3167788
- published 13 Dec 2022
- disclosed 12 Dec 2022
Introduced: 12 Dec 2022
CVE-2022-46908 Open this link in a new tabAmendment
The Debian
security team deemed this advisory irrelevant for Debian:11
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream sqlite3
package and not the sqlite3
package as distributed by Debian
.
SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.
References
- https://security-tracker.debian.org/tracker/CVE-2022-46908
- https://sqlite.org/src/info/cefc032473ac5ad2
- https://sqlite.org/forum/forumpost/07beac8056151b2f
- https://news.ycombinator.com/item?id=33948588
- https://security.netapp.com/advisory/ntap-20230203-0005/
- https://security.gentoo.org/glsa/202311-03