Package: sqlite3 / 3.8.7.1-1+deb8u2

Metadata

Package Version Patches format
sqlite3 3.8.7.1-1+deb8u2 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
10 520466 libsqlite3 depends on libdl.patch | (download)

configure.ac | 32 32 + 0 - 0 !
1 file changed, 32 insertions(+)

---
10 520478 squash bad deps.patch | (download)

Makefile.in | 6 4 + 2 - 0 !
1 file changed, 4 insertions(+), 2 deletions(-)

---
20 hurd locking style.patch | (download)

src/os_unix.c | 8 5 + 3 - 0 !
1 file changed, 5 insertions(+), 3 deletions(-)

---
30 cross.patch | (download)

Makefile.in | 21 17 + 4 - 0 !
1 file changed, 17 insertions(+), 4 deletions(-)

---
10 665363 disable malloc usable size.patch | (download)

configure.ac | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 disable malloc_usable_size
 Disable code introduced in sqlite 3.7.10 using malloc_usable_size, as it caused
 a regression on 64-bit platforms.
31 increase_SQLITE_MAX_DEFAULT_PAGE_SIZE_to_32k.patch | (download)

src/sqliteLimit.h | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 increase the maximum possible value of the page size
 Firefox/Iceweasel uses a page size of 32k, but sqlite won't allow it
 because the maximum it allows by default is 8k (through the
 SQLITE_MAX_DEFAULT_PAGE_SIZE define). This patch increases this limit.
 .
02 use packaged lempar.c.patch | (download)

tool/lemon.c | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

 use packaged lempar.c
 Look for lempar.c under the package directory.
40 CVE 2015 3414.patch | (download)

src/expr.c | 7 4 + 3 - 0 !
src/parse.y | 6 3 + 3 - 0 !
src/sqliteInt.h | 2 1 + 1 - 0 !
src/where.c | 9 4 + 5 - 0 !
test/collate1.test | 58 56 + 2 - 0 !
5 files changed, 68 insertions(+), 14 deletions(-)

 fix a problem causing collation sequence names to be dequoted multiple times under some circumstances
 SQLite before 3.8.9 does not properly implement the dequoting of
 collation-sequence names, which allows context-dependent attackers to cause a
 denial of service (uninitialized memory access and application crash) or
 possibly have unspecified other impact via a crafted COLLATE clause, as
 demonstrated by COLLATE"""""""" at the end of a SELECT statement.
Bug-Debian: https://bugs.debian.org/783968
41 CVE 2015 3415.patch | (download)

src/vdbe.c | 6 6 + 0 - 0 !
1 file changed, 6 insertions(+)

 ensure that comparison operators do not mess up the mem_dyn flag on registers when reverting affinity changes
 The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not
 properly implement comparison operators, which allows context-dependent
 attackers to cause a denial of service (invalid free operation) or possibly
 have unspecified other impact via a crafted CHECK clause, as demonstrated by
 CHECK(0&O>O) in a CREATE TABLE statement.
Bug-Debian: https://bugs.debian.org/783968
42 CVE 2015 3416.patch | (download)

src/printf.c | 7 4 + 3 - 0 !
test/printf.test | 3 3 + 0 - 0 !
2 files changed, 7 insertions(+), 3 deletions(-)

 guard against excessive width and precision in floating-point conversions in the printf routines
 The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not
 properly handle precision and width values during floating-point conversions,
 which allows context-dependent attackers to cause a denial of service
 (integer overflow and stack-based buffer overflow) or possibly have
 unspecified other impact via large integers in a crafted printf function call
 in a SELECT statement.
Bug-Debian: https://bugs.debian.org/783968
45 CVE 2016 6153_part1.patch | (download)

src/os_unix.c | 9 5 + 4 - 0 !
1 file changed, 5 insertions(+), 4 deletions(-)

---
46 CVE 2016 6153_part2.patch | (download)

src/os_unix.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

---
47 CVE 2016 6153_part3.patch | (download)

src/os_unix.c | 18 11 + 7 - 0 !
1 file changed, 11 insertions(+), 7 deletions(-)

---
50 fix_in memory_journal.patch | (download)

src/memjournal.c | 4 3 + 1 - 0 !
1 file changed, 3 insertions(+), 1 deletion(-)

---