This bug was fixed in the package sqlite3 - 3.8.2-1ubuntu2.1
---------------
sqlite3 (3.8.2-1ubuntu2.1) trusty-security; urgency=medium
* SECURITY UPDATE: array overrun in the skip-scan optimization
(LP: #1448758)
- debian/patches/CVE-2013-7443.patch: make sure array is large enough
in src/where.c, added test to test/skipscan1.test.
- CVE-2013-7443
* SECURITY UPDATE: improper dequoting of collation-sequence names
- debian/patches/CVE-2015-3414.patch: handle dequoting in src/expr.c,
src/parse.y, src/sqliteInt.h, src/where.c, added tests to
test/collate1.test.
- CVE-2015-3414
* SECURITY UPDATE: improper large integers handling in printf function
- debian/patches/CVE-2015-3416.patch: handle large integers in
src/printf.c, added tests to test/printf.test.
- CVE-2015-3416
-- Marc Deslauriers <[email protected]> Tue, 14 Jul 2015
13:26:04 -0400
** Changed in: sqlite3 (Ubuntu Trusty)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3414
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3416
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1448758
Title:
memory corruption/crash in 64bit version of 3.8.2
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs