linux.oracle.com
Open in
urlscan Pro
2a02:26f0:3100:786::a15
Public Scan
URL:
https://linux.oracle.com/cve/CVE-2022-35737.html
Submission: On July 12 via api from GB — Scanned from GB
Submission: On July 12 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Oracle * ULN * Support * Documentation * Downloads STAY CONNECTED: * Facebook * Twitter * LinkedIn * YouTube * Blog CVE-2022-35737 * ULN > * Oracle Linux CVE repository > * CVE-2022-35737 CVE DETAILS Release Date:2022-08-03 DESCRIPTION SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. See more information about CVE-2022-35737 from MITRE CVE dictionary and NIST NVD CVSS V3.0 METRICS NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review. Base Score: 7.5 Base Metrics: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Access Vector: Network Attack Complexity: Low Privileges Required: None User Interaction: None Scope: Unchanged Confidentiality Impact: None Integrity Impact: None Availability Impact: High ERRATA INFORMATION PlatformErrataRelease Date Oracle Linux version 8 (sqlite)ELSA-2023-01102023-01-12Oracle Linux version 9 (sqlite)ELSA-2023-03392023-01-24 This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team TECHNICAL INFORMATION * Oracle Linux Certified Hardware * Oracle Linux Supported Releases ORACLE LINUX SUPPORT * Oracle Linux Support * Oracle Premier Support for Systems * Advanced Customer Services CONNECT * Facebook * Twitter * LinkedIn * YouTube * Blog CONTACT US * Global contacts * Oracle 1-800-633-0691 Subscribe | Careers | Contact Us | Legal Notices | Terms of Use | Your Privacy Rights