Debian LTS: DLA-3431-1: sqlite security update
Summary
sqlite improperly implemented the temporary directory search algorithm,
which might allow local users to obtain sensitive information, cause a
denial of service (application crash), or have unspecified other impact
by leveraging use of the current working directory for temporary files.
CVE-2018-8740
Databases whose schema is corrupted using a CREATE TABLE AS statement
could cause a NULL pointer dereference,
For Debian 10 buster, these problems have been fixed in version
2.8.17-15+deb10u1.
We recommend that you upgrade your sqlite packages.
For the detailed security status of sqlite please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/sqlite
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS