Invalid free() issue was reported in SQLite. This was fixed by following upstream commit: https://www.sqlite.org/src/info/02e3c88fbf6abdcf More information about this issue can be found in the links below: http://www.securityfocus.com/archive/1/535269 http://lcamtuf.blogspot.fr/2015/04/finding-bugs-in-sqlite-easy-way.html
Created sqlite tracking bugs for this issue: Affects: fedora-all [bug 1212360]
spatialite-tools-4.2.0-10.fc21, sqlite-3.8.9-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
spatialite-tools-4.2.0-10.fc22, sqlite-3.8.9-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
spatialite-tools-4.1.1-12.fc20, sqlite-3.8.9-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Common Vulnerabilities and Exposures assigned an identifier CVE-2015-3415 to the following vulnerability: Name: CVE-2015-3415 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415 Assigned: 20150424 Reference: https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30 The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
RHEL 5 and 6 are *NOT affected by this flaw as the code affected by this CVE is not present in the sqlite package shipped for these products.
Created attachment 1055285 [details] Backported upstream patch for RHEL7
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:1635 https://rhn.redhat.com/errata/RHSA-2015-1635.html