CVE-2025-3277

NameCVE-2025-3277
DescriptionAn integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sqlite3 (PTS)bullseye3.34.1-3fixed
bullseye (security)3.34.1-3+deb11u1fixed
bookworm3.40.1-2+deb12u1fixed
sid, trixie3.46.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sqlite3sourcebullseye(not affected)
sqlite3sourcebookworm(not affected)
sqlite3source(unstable)3.46.1-3

Notes

[bookworm] - sqlite3 <not-affected> (Vulnerable code not present)
[bullseye] - sqlite3 <not-affected> (Vulnerable code not present)
Fixed by: https://sqlite.org/src/info/498e3f1cf57f164f (v3.49.1)
Duplicate of CVE-2025-29087

Search for package or bug name: Reporting problems