Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-7517

Опубликовано: 27 июн. 2025
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2025-7517: sqlite security update (IMPORTANT)

[3.46.1-4]

  • Fix for CVE-2025-3277
  • Resolves: RHEL-87295

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

sqlite

3.46.1-4.el10_0

sqlite-devel

3.46.1-4.el10_0

sqlite-libs

3.46.1-4.el10_0

Oracle Linux x86_64

sqlite

3.46.1-4.el10_0

sqlite-devel

3.46.1-4.el10_0

sqlite-libs

3.46.1-4.el10_0

Связанные CVE

Связанные уязвимости

CVSS3: 9.8
ubuntu
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 7.3
redhat
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 9.8
nvd
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.

CVSS3: 9.8
debian
4 месяца назад

An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...

CVSS3: 9.8
github
4 месяца назад

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.