Documentation Source Text

Check-in [36ae56152f]
Login

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview
Comment:Mention the CVE-2022-38627 bug in Linear eMerge E3 - that it is not a bug in SQLite.
Downloads: Tarball | ZIP archive
Timelines: family | ancestors | descendants | both | branch-3.40
Files: files | file ages | folders
SHA3-256: 36ae56152f9b94cee5bc13b656d13d793b50b76a9313fffac8930b2b207191b1
User & Date: drh 2023-01-02 12:13:01.920
Context
2023-01-04
16:14
Update the Expensify logo on the homepage to the latest version of their official logo. (check-in: 1b31b16a2d user: drh tags: branch-3.40)
2023-01-02
13:47
Cherry-pick branch-3.40 changes (and fix internal links therein.) (Leaf check-in: 139fb64868 user: larrybr tags: docgen_tweaks)
12:13
Mention the CVE-2022-38627 bug in Linear eMerge E3 - that it is not a bug in SQLite. (check-in: 36ae56152f user: drh tags: branch-3.40)
2022-12-28
14:21
Fix the chronology for the 3.40.1 release. (check-in: b802cae15f user: drh tags: branch-3.40)
Changes
Unified Diff Ignore Whitespace Patch
Changes to pages/cves.in.
271
272
273
274
275
276
277







278
279
280
281
282
283
284
CVE 2022-46908 not-in-core {
  This is a bug in the --safe command-line option of the [command-line shell]
  program that is available for accessing SQLite database files.  The bug does
  not exist in the SQLite library.  Nor is it an issue for the [CLI] as long as
  the user does not depend on the --safe option.  It is not serious.  It is
  debatable whether or not this is a security issue.
}







CVE 2022-35737 3.39.2 {
  This bug is an array-bounds overflow.  The bug is only accessible when using some
  of the C-language APIs provided by SQLite.  The bug cannot be reached using SQL
  nor can it be reached by providing SQLite with a corrupt database file.
  The bug only comes up when very long string inputs (greater than 2 billion bytes
  in length) are provided as arguments to a few specific C-language interfaces,
  and even then only under special circumstances.  







>
>
>
>
>
>
>







271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
CVE 2022-46908 not-in-core {
  This is a bug in the --safe command-line option of the [command-line shell]
  program that is available for accessing SQLite database files.  The bug does
  not exist in the SQLite library.  Nor is it an issue for the [CLI] as long as
  the user does not depend on the --safe option.  It is not serious.  It is
  debatable whether or not this is a security issue.
}
CVE 2022-38627 not-a-bug {
  This is not a bug in SQLite.  This is an 
  [https://en.wikipedia.org/wiki/SQL_injection|SQL injection bug] in a specific
  PHP application.  In other words, the bug is in the PHP application code, not
  in SQLite.  Even though this CVE is not about SQLite, "SQLite" is
  mentioned in the publicity about the bug and so we list it here.
}
CVE 2022-35737 3.39.2 {
  This bug is an array-bounds overflow.  The bug is only accessible when using some
  of the C-language APIs provided by SQLite.  The bug cannot be reached using SQL
  nor can it be reached by providing SQLite with a corrupt database file.
  The bug only comes up when very long string inputs (greater than 2 billion bytes
  in length) are provided as arguments to a few specific C-language interfaces,
  and even then only under special circumstances.