linux.oracle.com Open in urlscan Pro
2a02:26f0:3100:786::a15  Public Scan

URL: https://linux.oracle.com/cve/CVE-2022-35737.html
Submission: On July 12 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Oracle
 * ULN
 * Support
 * Documentation
 * Downloads

STAY CONNECTED:

 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Blog


CVE-2022-35737

 * ULN > 
 * Oracle Linux CVE repository  > 
 * CVE-2022-35737


CVE DETAILS

Release Date:2022-08-03


DESCRIPTION


SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds
overflow if billions of bytes are used in a string argument to a C API.

See more information about CVE-2022-35737 from MITRE CVE dictionary and NIST NVD



CVSS V3.0 METRICS


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and
subject to review.

Base Score: 7.5 Base Metrics: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Access Vector:
Network Attack Complexity: Low Privileges Required: None User Interaction: None
Scope: Unchanged Confidentiality Impact: None Integrity Impact: None
Availability Impact: High



ERRATA INFORMATION


PlatformErrataRelease Date Oracle Linux version 8
(sqlite)ELSA-2023-01102023-01-12Oracle Linux version 9
(sqlite)ELSA-2023-03392023-01-24




This page is generated automatically and has not been checked for errors or
omissions. For clarification or corrections please contact the Oracle Linux ULN
team


TECHNICAL INFORMATION

 * Oracle Linux Certified Hardware
 * Oracle Linux Supported Releases


ORACLE LINUX SUPPORT

 * Oracle Linux Support
 * Oracle Premier Support for Systems
 * Advanced Customer Services


CONNECT

 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Blog


CONTACT US

 * Global contacts
 * Oracle 1-800-633-0691

Subscribe | Careers | Contact Us | Legal Notices | Terms of Use | Your Privacy
Rights