CVE-2025-7709

NameCVE-2025-7709
DescriptionAn integer overflow exists in the FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1114609

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sqlite3 (PTS)bullseye3.34.1-3fixed
bullseye (security)3.34.1-3+deb11u1fixed
bookworm3.40.1-2+deb12u2vulnerable
trixie3.46.1-7vulnerable
forky, sid3.46.1-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sqlite3sourcebullseye(not affected)
sqlite3source(unstable)3.46.1-81114609

Notes

[trixie] - sqlite3 <no-dsa> (Minor issue)
[bookworm] - sqlite3 <no-dsa> (Minor issue)
[bullseye] - sqlite3 <not-affected> (The vulnerable code was introduced later)
https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g
Fixed by: https://sqlite.org/src/info/63595b74956a9391
Fixed by: https://github.com/sqlite/sqlite/commit/192d0ff8ccf0bf55776a5930cdc64e25f87299d6

Search for package or bug name: Reporting problems