Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 863431 (CVE-2022-35737) - <dev-db/sqlite-3.39.2: buffer overflow
Summary: <dev-db/sqlite-3.39.2: buffer overflow
Status: IN_PROGRESS
Alias: CVE-2022-35737
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.sqlite.org/cves.html
Whiteboard: B2 [glsa?]
Keywords:
Depends on: 862429
Blocks:
  Show dependency tree
 
Reported: 2022-08-03 17:39 UTC by John Helmert III
Modified: 2022-08-24 00:23 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-03 17:39:32 UTC
CVE-2022-35737 (https://kb.cert.org/vuls/id/720344):

SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.

The CERT URL 404's for me, but the SQLite CVEs patch lists the fix as in 3.39.2