Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Pufferüberlauf in SQLite
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in SQLite
ID: FEDORA-2017-357f9df699
Distribution: Fedora
Plattformen: Fedora 26
Datum: So, 16. Juli 2017, 23:09
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-357f9df699
2017-07-16 19:40:43.833321
-------------------------------------------------------------------------------
-

Name : sqlite
Product : Fedora 26
Version : 3.19.3
Release : 1.fc26
URL : http://www.sqlite.org/
Summary : Library that implements an embeddable SQL database engine
Description :
SQLite is a C library that implements an SQL database engine. A large
subset of SQL92 is supported. A complete database is stored in a
single disk file. The API is designed for convenience and ease of use.
Applications that link against SQLite can enjoy the power and
flexibility of an SQL database without the administrative hassles of
supporting a separate database server. Version 2 and version 3 binaries
are named to permit each to be installed on a single host

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2017-10989: Heap-buffer overflow in the getNodeSize
function Additionally sqlite has been updated to version 3.19.3, and
spatialite-tools rebuilt for the update.
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1469672 - CVE-2017-10989 sqlite: Heap-buffer overflow in the
getNodeSize function
https://bugzilla.redhat.com/show_bug.cgi?id=1469672
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade sqlite' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung