{"id":"USN-2698-1","summary":"sqlite3 vulnerabilities","details":"It was discovered that SQLite incorrectly handled skip-scan optimization.\nAn attacker could use this issue to cause applications using SQLite to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 14.04 LTS. (CVE-2013-7443)\n\nMichal Zalewski discovered that SQLite incorrectly handled dequoting of\ncollation-sequence names. An attacker could use this issue to cause\napplications using SQLite to crash, resulting in a denial of service, or\npossibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS\nand Ubuntu 15.04. (CVE-2015-3414)\n\nMichal Zalewski discovered that SQLite incorrectly implemented comparison\noperators. An attacker could use this issue to cause applications using\nSQLite to crash, resulting in a denial of service, or possibly execute\narbitrary code. This issue only affected Ubuntu 15.04. (CVE-2015-3415)\n\nMichal Zalewski discovered that SQLite incorrectly handle printf precision\nand width values during floating-point conversions. An attacker could use\nthis issue to cause applications using SQLite to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. (CVE-2015-3416)\n","modified":"2026-04-22T09:14:59.342703Z","published":"2015-07-30T16:48:50Z","related":["UBUNTU-CVE-2013-7443","UBUNTU-CVE-2015-3414","UBUNTU-CVE-2015-3416"],"upstream":["CVE-2013-7443","CVE-2015-3414","CVE-2015-3416","UBUNTU-CVE-2013-7443","UBUNTU-CVE-2015-3414","UBUNTU-CVE-2015-3415","UBUNTU-CVE-2015-3416"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2698-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-7443"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3414"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3415"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3416"}],"affected":[{"package":{"name":"sqlite3","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/sqlite3@3.8.2-1ubuntu2.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.8.2-1ubuntu2.1"}]}],"versions":["3.7.17-1ubuntu1","3.8.0.2-1ubuntu1","3.8.1-1ubuntu1","3.8.1-1ubuntu3","3.8.2-1ubuntu1","3.8.2-1ubuntu2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"lemon","binary_version":"3.8.2-1ubuntu2.1"},{"binary_name":"libsqlite3-0","binary_version":"3.8.2-1ubuntu2.1"},{"binary_name":"libsqlite3-tcl","binary_version":"3.8.2-1ubuntu2.1"},{"binary_name":"sqlite3","binary_version":"3.8.2-1ubuntu2.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2698-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2013-7443"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2015-3414"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2015-3416"}]}}}],"schema_version":"1.7.5"}