CVE-2022-21227

NameCVE-2022-21227
DescriptionThe package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-sqlite3 (PTS)buster4.0.6+ds1-2fixed
bullseye (security), bullseye5.0.0+ds1-1+deb11u2fixed
sid, trixie, bookworm5.1.5+ds1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-sqlite3sourcestretch(unfixed)end-of-life
node-sqlite3sourcebuster(not affected)
node-sqlite3sourcebullseye5.0.0+ds1-1+deb11u1
node-sqlite3source(unstable)5.0.6+ds1-1

Notes

[buster] - node-sqlite3 <not-affected> (Vulnerable code introduced later)
[stretch] - node-sqlite3 <end-of-life> (Nodejs in stretch not covered by security support)
https://github.com/advisories/GHSA-9qrh-qjmc-5w2p
Fixed by: https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a (v5.0.3)
https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645
Introduced by: https://github.com/TryGhost/node-sqlite3/commit/dd3ef522088bb5cafede25b9fe661f892b6f10ba (v5.0.0)

Search for package or bug name: Reporting problems