Release date:
2022-11-10 22:07:03 UTC
Description:
* SECURITY UPDATE: array-bounds overflow if billions of bytes are
used in a string argument to a C API
- debian/patches/CVE-2022-35737.patch: increase the size of loop
variables in the printf() implementation to avoid overflow.
- CVE-2022-35737
Updated packages:
-
lemon_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
sha:043d1488ce344c5afbcebd38c70cf84fbfc1a48f
-
libsqlite3-0_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
sha:a7310463d024b90b64e3509a250c49078af2250a
-
libsqlite3-dev_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
sha:bd4da8fc489309946c1a4c5cc44dfe9696e40bfe
-
libsqlite3-tcl_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
sha:7da54e30dbbe101cf74dc19474f414cb0a6e860c
-
sqlite3_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
sha:71fb471191538bffdb84b312b2759f493198a81c
-
sqlite3-doc_3.11.0-1ubuntu1.5+tuxcare.els3_all.deb
sha:928e8e3df00faf1fbfb5fd16b802cbfd6f20bc67
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.