CVE-2019-5018 (https://nvd.nist.gov/vuln/detail/CVE-2019-5018): An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
amd64 stable
arm64 stable
sparc stable
x86 stable
hppa stable
arm stable
ppc64 stable
s390 stable
ppc stable
ia64 stable
alpha stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Let's give one or two weeks for M68K and SH.
(In reply to Arfrever Frehtes Taifersar Arahesis from comment #12) > Let's give one or two weeks for M68K and SH. They are not stable arches. Can we move on now?
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9b4ecf2fe8842b5ee546ab56f81bbb470cbe91a8 commit 9b4ecf2fe8842b5ee546ab56f81bbb470cbe91a8 Author: Arfrever Frehtes Taifersar Arahesis <Arfrever@Apache.Org> AuthorDate: 2019-08-09 17:09:52 +0000 Commit: Mike Gilbert <floppym@gentoo.org> CommitDate: 2019-08-09 18:39:00 +0000 dev-db/sqlite: Delete old version (3.27.2). Bug: https://bugs.gentoo.org/685838 Signed-off-by: Arfrever Frehtes Taifersar Arahesis <Arfrever@Apache.Org> Signed-off-by: Mike Gilbert <floppym@gentoo.org> dev-db/sqlite/Manifest | 3 - .../files/sqlite-3.27.0-full_archive-build.patch | 461 --------------------- .../files/sqlite-3.27.2-full_archive-tests.patch | 36 -- dev-db/sqlite/sqlite-3.27.2.ebuild | 328 --------------- 4 files changed, 828 deletions(-)
This issue was resolved and addressed in GLSA 201908-09 at https://security.gentoo.org/glsa/201908-09 by GLSA coordinator Aaron Bauman (b-man).