Your message dated Mon, 10 Jun 2019 22:42:50 +0200
with message-id 
<cakjshr2ronlhdgojvjqmsado3zzrfat-ehs-gzxhuogr9tt...@mail.gmail.com>
and subject line Re: Bug#929775: sqlite3: CVE-2019-8457
has caused the Debian Bug report #929775,
regarding sqlite3: CVE-2019-8457
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
929775: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: sqlite3
Version: 3.27.2-2
Severity: important
Tags: security upstream
Control: found -1 3.16.2-5+deb9u1
Control: found -1 3.16.2-5

Hi,

The following vulnerability was published for sqlite3.

CVE-2019-8457[0]:
| SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-
| of-bound read in the rtreenode() function when handling invalid rtree
| tables.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-8457
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
[1] https://www.sqlite.org/src/info/90acdbfce9c08858

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 3.27.2-3

On Thu, May 30, 2019 at 10:39 PM Salvatore Bonaccorso <[email protected]> wrote:
> CVE-2019-8457[0]:
> | SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-
> | of-bound read in the rtreenode() function when handling invalid rtree
> | tables.
 Fixed in the last upload, forgot to close it in the changelog. My
bad, sorry about that.

Cheers,
Laszlo/GCS

--- End Message ---

Reply via email to