drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zahlenüberlauf in sqlite3 (Aktualisierung)
Name: |
Zahlenüberlauf in sqlite3 (Aktualisierung) |
|
ID: |
DSA-3252-2 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy, Debian jessie, Debian stretch |
|
Datum: |
So, 14. Juni 2015, 21:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416 |
|
Applikationen: |
SQLite |
|
Update von: |
Mehrere Probleme in sqlite3 |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3252-2 security@debian.org https://www.debian.org/security/ Alessandro Ghedini June 14, 2015 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : sqlite3 CVE ID : CVE-2015-3416 Debian Bug : 783968
Michal Zalewski discovered that SQLite3, an implementation of an SQL database engine, did not properly handle precision and width values during floating-point conversions, leading to an integer overflow and a stack-based buffer overflow. This could allow remote attackers to cause a denial of service (crash) or possibly have unspecified other impact.
Note that this issue had already been fixed for the stable distribution (jessie) as part of DSA 3252-1.
For the oldstable distribution (wheezy), this problem has been fixed in version 3.7.13-1+deb7u2.
For the stable distribution (jessie), this problem has been fixed in version 3.8.7.1-1+deb8u1.
For the testing distribution (stretch), this problem has been fixed in version 3.8.10.2-1.
For the unstable distribution (sid), this problem has been fixed in version 3.8.10.2-1.
We recommend that you upgrade your sqlite3 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVfZk3AAoJEK+lG9bN5XPLpV0P/0WW2qKSSsMkFznwZ8tK2n6I LbvWQcPN48ydcIk68eHACRXMcMS4utmOgH/Ge51fIx/BqGL0waZhBJ3w2vlYiiSM 3aLNCtmyipX/rugLglVcI+yeHSjMrqKnL7Fqkmv21yNxM/jTjYuwH22yNSaGuqGU Zk4IYus738LzSQIMDiZ3+HW5A6j3MeJkoLwgW+C2yuwVs2p3df9uKxyOn5t8tZuZ cuXvTzIx3hL65ZKS24c+fVV+kqyPT0yaM5JxFiTigm6QmUS0olAmQFaGLNRyxbD8 7RZvg7qsKqZQBxO375gGMeISMFWAXyNUfPUo36QG6xcMt6fgWgSCKqcLrYd7N/Yx ZKWRrF4/5d6eagyNTLflAI8/le4Bjksoe2MP6Fy9/Xs28oS3UU63ZA1X40LZ1QAD NR6LxMiqbRWKolYQg8IDeYbe5ABevOmK4Ko27o9+NM7YJwzRZ3iJ1WyM5sUj9EKh 8uVnT6BgQk/uYPziaoegeKYMTQ5fJ8Lt/p26y8aK7jw7GAWK7sPiaAiBYz2TNk29 Q8fIcCN6bJ8kOpR6JCzQiONLKjWHX6gYww7Q7Gk3KVngoOIwBRQXHnLCYiqzP4TX zYZGNCeUQJp4xosr4EebGWFVGRZO1f8lS5z5+kiR9At1AypImBm/eLoOC+6eQTbl 2/h0kXgEbXU/yVZ5bGhH =75qj -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/557d9938.2852b40a.5b32.033a@mx.google.com
|
|
|
|