Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 14 Jul 2015 11:02:27 -0400
From: Marc Deslauriers <marc.deslauriers@...onical.com>
To: oss-security@...ts.openwall.com
CC: security <security@...ntu.com>
Subject: CVE Request: SQLite array overrun in the skip-scan optimization

Hello,

SQLite 3.8.2 contained an array overrun in the skip-scan optimization leading to
memory corruption. Fixed in 3.8.3.

Bugs:
https://www.sqlite.org/src/info/520070ec7fbaac
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758

Fixed by the following commit:
https://www.sqlite.org/src/info/ac5852d6403c9c96

Could a CVE please be assigned to this issue? (needs a CVE-2013)

Thanks,

Marc.

-- 
Marc Deslauriers
Ubuntu Security Engineer     | http://www.ubuntu.com/
Canonical Ltd.               | http://www.canonical.com/

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ