-
sqlite3 (3.40.1-1ubuntu0.1) lunar-security; urgency=medium
* SECURITY UPDATE: heap overflow in sessionReadRecord
- debian/patches/CVE-2023-7104.patch: fix a buffer overread in the
sessions extension that could occur when processing a corrupt
changeset in ext/session/sqlite3session.c.
- CVE-2023-7104
-- Marc Deslauriers <email address hidden> Tue, 02 Jan 2024 09:37:14 -0500
-
sqlite3 (3.40.1-1) unstable; urgency=medium
* New upstream release.
* Update symbols file.
* Update Standards-Version to 4.6.2 .
-- Laszlo Boszormenyi (GCS) <email address hidden> Sat, 31 Dec 2022 09:41:40 +0100
-
sqlite3 (3.40.0-2) unstable; urgency=high
* Backport upstream security fix for CVE-2022-46908: when relying on --safe
for execution of an untrusted CLI script, does not properly implement the
azProhibitedFunctions protection mechanism (closes: #1026293).
[ Helge Deller <email address hidden> ]
* Enable large file support (closes: #1026171).
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 18 Dec 2022 10:03:56 +0100
-
sqlite3 (3.40.0-1) unstable; urgency=medium
* New upstream release.
* Remove sqlite3StdTypeMap@Base symbol as no longer part of the library.
* Update symbols file.
* Update patches to apply clean.
-- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 16 Nov 2022 18:21:56 +0100
-
sqlite3 (3.39.4-1) unstable; urgency=high
* New upstream release:
- fix a possible integer overflow in the size computation for a memory
allocation in FTS3.
-- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 02 Oct 2022 18:17:34 +0200
-
sqlite3 (3.39.3-1) unstable; urgency=medium
* New upstream release.
-- Laszlo Boszormenyi (GCS) <email address hidden> Mon, 05 Sep 2022 17:38:52 +0200