Search for packages
| purl | pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2 |
| Next non-vulnerable version | 3.46.1-7+deb13u1 |
| Latest non-vulnerable version | 3.46.1-7+deb13u1 |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2k32-4p92-1ygz
Aliases: CVE-2025-7709 |
An integer overflow exists in the FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds. |
Affected by 0 other vulnerabilities. |
|
VCID-6xmb-3zgw-xudu
Aliases: CVE-2025-29088 |
sqlite: Denial of Service in SQLite |
Affected by 0 other vulnerabilities. |
|
VCID-jree-ndwj-kfcy
Aliases: CVE-2025-7458 |
sqlite: SQLite integer overflow |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-7es8-7d9x-xfgm | Improper Validation of Array Index SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. |
CVE-2022-35737
GHSA-jw36-hf63-69r9 |
| VCID-bgz9-v5cv-8kea | A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library. |
CVE-2021-36690
|
| VCID-fyxk-hw7d-ruc4 | sqlite: Integer Truncation in SQLite |
CVE-2025-6965
|
| VCID-jqy9-zum8-aqfn | sqlite: heap-buffer-overflow at sessionfuzz |
CVE-2023-7104
|