The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
https://support.apple.com/HT205267
https://support.apple.com/HT205213
https://security.gentoo.org/glsa/201507-05
http://www.ubuntu.com/usn/USN-2698-1
http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920
http://www.securitytracker.com/id/1033703
http://www.securityfocus.com/bid/74228
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
http://www.debian.org/security/2015/dsa-3252
http://seclists.org/fulldisclosure/2015/Apr/31
http://rhn.redhat.com/errata/RHSA-2015-1635.html
http://rhn.redhat.com/errata/RHSA-2015-1634.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html