An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1909 Final 1.0 1.0 2022-09-09 Initial 2022-09-09 2022-09-09 openEuler SA Tool V1.0 2022-09-09 sqlite security update An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. SQLite is a C-language library that implements a small, fast, self-contained,high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world. SQLite is built into all mobile phones and most computers and comes bundled inside countless other applications that people use every day.It also include lemon and sqlite3_analyzer and tcl tools. Security Fix(es): SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.(CVE-2022-35737) An update for sqlite is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High sqlite https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1909 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-35737 https://nvd.nist.gov/vuln/detail/CVE-2022-35737 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS sqlite-devel-3.32.3-6.oe1.aarch64.rpm sqlite-3.32.3-6.oe1.aarch64.rpm sqlite-debugsource-3.32.3-6.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-6.oe1.aarch64.rpm sqlite-debuginfo-3.32.3-6.oe1.aarch64.rpm sqlite-devel-3.32.3-6.oe1.aarch64.rpm sqlite-debugsource-3.32.3-6.oe1.aarch64.rpm sqlite-3.32.3-6.oe1.aarch64.rpm sqlite-devel-3.37.2-2.oe2203.aarch64.rpm sqlite-debugsource-3.37.2-2.oe2203.aarch64.rpm sqlite-debuginfo-3.37.2-2.oe2203.aarch64.rpm sqlite-3.37.2-2.oe2203.aarch64.rpm sqlite-help-3.32.3-6.oe1.noarch.rpm sqlite-help-3.32.3-6.oe1.noarch.rpm sqlite-help-3.37.2-2.oe2203.noarch.rpm sqlite-3.32.3-6.oe1.src.rpm sqlite-3.32.3-6.oe1.src.rpm sqlite-3.37.2-2.oe2203.src.rpm sqlite-debuginfo-3.32.3-6.oe1.x86_64.rpm sqlite-devel-3.32.3-6.oe1.x86_64.rpm sqlite-3.32.3-6.oe1.x86_64.rpm sqlite-debugsource-3.32.3-6.oe1.x86_64.rpm sqlite-debuginfo-3.32.3-6.oe1.x86_64.rpm sqlite-devel-3.32.3-6.oe1.x86_64.rpm sqlite-3.32.3-6.oe1.x86_64.rpm sqlite-debugsource-3.32.3-6.oe1.x86_64.rpm sqlite-debugsource-3.37.2-2.oe2203.x86_64.rpm sqlite-3.37.2-2.oe2203.x86_64.rpm sqlite-devel-3.37.2-2.oe2203.x86_64.rpm sqlite-debuginfo-3.37.2-2.oe2203.x86_64.rpm SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. 2022-09-09 CVE-2022-35737 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H sqlite security update 2022-09-09 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1909