{"id":"CVE-2021-31239","details":"An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function.","aliases":["BIT-sqlite-2021-31239"],"modified":"2026-04-12T02:46:38.992125Z","published":"2023-05-09T02:15:08.907Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/"},{"type":"WEB","url":"https://www.sqlite.org/forum/forumpost/d9fce1a89b"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-03"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230609-0010/"},{"type":"ADVISORY","url":"https://www.sqlite.org/cves.html"},{"type":"FIX","url":"https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sqlite/sqlite","events":[{"introduced":"0"},{"last_affected":"8bec96953b78abf7ee0323850434e956a435b0ba"}],"database_specific":{"cpe":"cpe:2.3:a:sqlite:sqlite:3.35.4:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.35.4"}]}}],"versions":["same-as-3.35.3","version-1.0","version-1.0.1","version-1.0.10","version-1.0.12","version-1.0.13","version-1.0.14","version-1.0.15","version-1.0.16","version-1.0.17","version-1.0.18","version-1.0.19","version-1.0.20","version-1.0.21","version-1.0.22","version-1.0.23","version-1.0.24","version-1.0.25","version-1.0.26","version-1.0.27","version-1.0.28","version-1.0.29","version-1.0.3","version-1.0.30","version-1.0.31","version-1.0.32","version-1.0.4","version-1.0.5","version-1.0.8","version-1.0.9","version-2.0.0","version-2.0.1","version-2.0.2","version-2.0.3","version-2.0.4","version-2.0.5","version-2.0.6","version-2.0.7","version-2.0.8","version-2.1.0","version-2.1.1","version-2.1.2","version-2.1.3","version-2.1.4","version-2.1.5","version-2.1.6","version-2.1.7","version-2.2.0","version-2.2.1","version-2.2.2","version-2.2.3","version-2.2.4","version-2.2.5","version-2.3.0","version-2.3.1","version-2.3.2","version-2.3.3","version-2.4.0","version-2.4.1","version-2.4.10","version-2.4.11","version-2.4.12","version-2.4.2","version-2.4.3","version-2.4.4","version-2.4.5","version-2.4.6","version-2.4.7","version-2.4.8","version-2.4.9","version-2.5.0","version-2.5.1","version-2.5.2","version-2.5.3","version-2.5.4","version-2.5.5","version-2.5.6","version-2.6.0","version-2.6.1","version-2.6.2","version-2.6.3","version-2.7.0","version-2.7.1","version-2.7.2","version-2.7.3","version-2.7.4","version-2.7.5","version-2.7.6","version-2.8.0","version-2.8.1","version-2.8.10","version-2.8.11","version-2.8.12","version-2.8.13","version-2.8.2","version-2.8.3","version-2.8.4","version-2.8.5","version-2.8.6","version-2.8.7","version-2.8.8","version-2.8.9","version-3.0.0","version-3.0.1","version-3.0.2","version-3.0.3","version-3.0.4","version-3.0.5","version-3.0.6","version-3.0.7","version-3.0.8","version-3.1.0","version-3.1.1","version-3.1.2","version-3.1.3","version-3.1.3.1","version-3.1.4","version-3.1.5","version-3.1.6","version-3.10.0","version-3.11.0","version-3.12.0","version-3.13.0","version-3.14.0","version-3.15.0","version-3.16.0","version-3.2.0","version-3.2.1","version-3.2.2","version-3.2.3","version-3.2.4","version-3.2.5","version-3.2.6","version-3.2.7","version-3.22.0","version-3.23.0","version-3.23.1","version-3.24.0","version-3.25.0","version-3.26.0","version-3.27.0","version-3.28.0","version-3.29.0","version-3.3.0","version-3.3.1","version-3.3.10","version-3.3.11","version-3.3.12","version-3.3.13","version-3.3.14","version-3.3.15","version-3.3.16","version-3.3.17","version-3.3.2","version-3.3.3","version-3.3.4","version-3.3.5","version-3.3.6","version-3.3.7","version-3.3.8","version-3.3.9","version-3.30.0","version-3.31.0","version-3.31.1","version-3.32.0","version-3.32.1","version-3.33.0","version-3.34.0","version-3.35.0","version-3.35.1","version-3.35.2","version-3.35.3","version-3.35.4","version-3.4.0","version-3.4.1","version-3.4.2","version-3.5.0","version-3.5.1","version-3.5.2","version-3.5.3","version-3.5.4","version-3.5.5","version-3.5.6","version-3.5.7","version-3.5.8","version-3.5.9","version-3.6.0","version-3.6.1","version-3.6.10","version-3.6.11","version-3.6.12","version-3.6.13","version-3.6.14","version-3.6.15","version-3.6.16","version-3.6.17","version-3.6.18","version-3.6.19","version-3.6.2","version-3.6.20","version-3.6.21","version-3.6.22","version-3.6.23","version-3.6.3","version-3.6.4","version-3.6.5","version-3.6.6","version-3.6.7","version-3.6.8","version-3.6.9","version-3.7.0","version-3.7.1","version-3.7.10","version-3.7.11","version-3.7.12","version-3.7.12.1","version-3.7.13","version-3.7.14","version-3.7.15","version-3.7.16","version-3.7.16.1","version-3.7.17","version-3.7.2","version-3.7.3","version-3.7.4","version-3.7.5","version-3.7.6","version-3.7.6.1","version-3.7.7","version-3.7.8","version-3.7.9","version-3.8.0","version-3.8.1","version-3.8.10","version-3.8.10.1","version-3.8.11","version-3.8.11.1","version-3.8.2","version-3.8.3","version-3.8.4","version-3.8.4.1","version-3.8.5","version-3.8.6","version-3.8.7","version-3.8.8","version-3.8.9","version-3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31239.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}