CVE-2015-3416

Published: 24 April 2015

The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.

Priority

Low

Status

Package Release Status
sqlite
Launchpad, Ubuntu, Debian
Upstream
Released (3.8.9)
Ubuntu 21.04 (Hirsute Hippo) Needed

Ubuntu 20.04 LTS (Focal Fossa) Needed

Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Needed

sqlite3
Launchpad, Ubuntu, Debian
Upstream
Released (3.8.9)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.8.10.2-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.8.10.2-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(3.8.10.2-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(3.8.10.2-1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (3.8.2-1ubuntu2.1)
Patches:
Upstream: http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920
Upstream: https://www.sqlite.org/src/info/aeca95ac77f6f320