> Can you provide those entries ?

Here's what I have for the SQLite issue

    <topic>sqlite -- use-after-free bug in jsonparseaddnodearray</topic>
    <affects>
      <package>
        <name>sqlite3</name>
        <range><ge>3.49.1,1</ge><lt>3.50.3,1</lt></range>
      </package>
      <package>
        <name>linux-rl9-sqlite</name>
        <range><ge>3.49.1,1</ge><lt>3.50.3,1</lt></range>
      </package>
      <package>
        <name>linux-c7-sqlite</name>
        <range><ge>3.49.1,1</ge><lt>3.50.3,1</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml";>
        <p>Google Security Research reports:</p>
        <blockquote 
cite="https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g";>
          <p>An integer overflow exists in the FTS5 
(https://sqlite.org/fts5.html)
          extension. It occurs when the size of an array of tombstone pointers
          is calculated and truncated into a 32-bit integer. A pointer to
          partially controlled data can then be written out of bounds.</p>
        </blockquote>
        </body>
    </description>
    <references>
      <cvename>CVE-2024-7709</cvename>
      <url>https://nvd.nist.gov/vuln/detail/CVE-2024-7709</url>
    </references>
    <dates>
      <discovery>2025-07-15</discovery>
      <entry>2025-10-28</entry>
      <modified>2025-10-28</modified>
    </dates>

Reply via email to