[CLSA-2022:1668118023] Fix CVE(s): CVE-2022-35737
Type:
security
Severity:
Important
Release date:
2022-11-10 22:07:03 UTC
Description:
* SECURITY UPDATE: array-bounds overflow if billions of bytes are used in a string argument to a C API - debian/patches/CVE-2022-35737.patch: increase the size of loop variables in the printf() implementation to avoid overflow. - CVE-2022-35737
Updated packages:
  • lemon_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
    sha:043d1488ce344c5afbcebd38c70cf84fbfc1a48f
  • libsqlite3-0_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
    sha:a7310463d024b90b64e3509a250c49078af2250a
  • libsqlite3-dev_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
    sha:bd4da8fc489309946c1a4c5cc44dfe9696e40bfe
  • libsqlite3-tcl_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
    sha:7da54e30dbbe101cf74dc19474f414cb0a6e860c
  • sqlite3_3.11.0-1ubuntu1.5+tuxcare.els3_amd64.deb
    sha:71fb471191538bffdb84b312b2759f493198a81c
  • sqlite3-doc_3.11.0-1ubuntu1.5+tuxcare.els3_all.deb
    sha:928e8e3df00faf1fbfb5fd16b802cbfd6f20bc67
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.