SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds
overflow if billions of bytes are used in a string argument to a C API.
Author | Note |
---|---|
mdeslaur | the wrong commit was previously identified, but didnât match the vulnerability PoC. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | sqlite | <Â any | UNKNOWN |
ubuntu | 18.04 | noarch | sqlite3 | <Â 3.22.0-1ubuntu0.7 | UNKNOWN |
ubuntu | 20.04 | noarch | sqlite3 | <Â 3.31.1-4ubuntu0.5 | UNKNOWN |
ubuntu | 22.04 | noarch | sqlite3 | <Â 3.37.2-2ubuntu0.1 | UNKNOWN |
ubuntu | 14.04 | noarch | sqlite3 | <Â 3.8.2-1ubuntu2.2+esm3 | UNKNOWN |
ubuntu | 16.04 | noarch | sqlite3 | <Â 3.11.0-1ubuntu1.5+esm2 | UNKNOWN |
blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
launchpad.net/bugs/cve/CVE-2022-35737
nvd.nist.gov/vuln/detail/CVE-2022-35737
security-tracker.debian.org/tracker/CVE-2022-35737
ubuntu.com/security/notices/USN-5712-1
ubuntu.com/security/notices/USN-5716-1
ubuntu.com/security/notices/USN-5716-2
www.cve.org/CVERecord?id=CVE-2022-35737