http://www.mandriva.com/en/
______________________________
Package : sqlite3
Date : April 30, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in sqlite3:
SQLite before 3.8.9 does not properly implement the dequoting of
collation-sequence names, which allows context-dependent attackers to
cause a denial of service (uninitialized memory access and application
crash) or possibly have unspecified other impact via a crafted COLLATE
clause, as demonstrated by COLLATE at the end of a SELECT statement
(CVE-2015-3414).
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9
does not properly implement comparison operators, which allows
context-dependent attackers to cause a denial of service (invalid
free operation) or possibly have unspecified other impact via a
crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE
TABLE statement (CVE-2015-3415).
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does
not properly handle precision and width values during floating-point
conversions, which allows context-dependent attackers to cause a
denial of service (integer overflow and stack-based buffer overflow)
or possibly have unspecified other impact via large integers in a
crafted printf function call in a SELECT statement (CVE-2015-3416).
The updated packages provides a solution for these security issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
https://bugzilla.redhat.com/
https://bugzilla.redhat.com/
https://bugzilla.redhat.com/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
adb7e2731d814af7948c8a65662e7c
8c9620460c62d0f7d07bd5fee68ac0
f060fd3ca68302f59e47e9bc1b336d
0fdd2e8a7456b51773b2a131534b98
14682c0d09a3dc73f4405ee136c611
c2fc81b9162865ecdcef85aaa80550
474e6b9bc6a7299f8ab34a90893bbd
Mandriva Business Server 2/X86_64:
44c4a002a3480388751603981327a2
9d2ded51447e5f133c37257635ef4f
42c8fce0126487fa0a72b4f5f1b5e8
a93c0f348006f6675779bf7cd5c9f5
792f42a7a38d7947e7b5d0ea67510d
947e30fcb8c4f19b1398d6e29adc29
150cb2acc870d5ca8a343f21edef42
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą