Описание
ELSA-2025-7517: sqlite security update (IMPORTANT)
[3.46.1-4]
- Fix for CVE-2025-3277
- Resolves: RHEL-87295
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
sqlite
3.46.1-4.el10_0
sqlite-devel
3.46.1-4.el10_0
sqlite-libs
3.46.1-4.el10_0
Oracle Linux x86_64
sqlite
3.46.1-4.el10_0
sqlite-devel
3.46.1-4.el10_0
sqlite-libs
3.46.1-4.el10_0
Связанные CVE
Связанные уязвимости
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
An integer overflow can be triggered in SQLite\u2019s `concat_ws()` fu ...
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.