{"id":"MGASA-2017-0238","summary":"Updated sqlite3 packages fix security vulnerability","details":"Pointer disclosure in SQLite (CVE-2017-7000).\n\nThe getNodeSize function in ext/rtree/rtree.c in SQLite mishandles undersized\nRTree blobs in a crafted database, leading to a heap-based buffer over-read or\npossibly unspecified other impact (CVE-2017-10989).\n\nNote: the CVE-2017-10989 issue only affected Mageia 5.\n","modified":"2026-04-16T01:49:09.178874791Z","published":"2017-08-03T19:05:47Z","upstream":["CVE-2017-10989","CVE-2017-7000"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0238.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21200"},{"type":"WEB","url":"https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5LTI7HXMO72BGOW6GWY4GIWPZBXLF3UH/"}],"affected":[{"package":{"name":"sqlite3","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/sqlite3?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.10.2-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0238.json"}},{"package":{"name":"sqlite3","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/sqlite3?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.17.0-2.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0238.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}