Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <d5189e3b-44e0-4c3d-a36c-18b03f0d9a48@oracle.com>
Date: Fri, 5 Sep 2025 17:29:25 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: SQLite - Integer Overflow in FTS5 Extension
 [CVE-2025-7709]

https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g
was published on August 15, and states:

> Summary
> -------
> An integer overflow exists in the FTS5 extension. It occurs when the size of an
> array of tombstone pointers is calculated and truncated into a 32-bit integer.
> A pointer to partially controlled data can then be written out of bounds.
> 
> Severity
> --------
> Moderate - The overflow can be triggered by either an attacker who is able to
> execute arbitrary queries or an attacker that can make an application process
> a controlled SQLite DB file.
> 
> Proof of Concept
> ----------------
> 
> echo "SELECT * FROM articles WHERE articles MATCH 'whatever'" | ./sqlite3 /tmp/poc.sql
> =================================================================
> ==3811642==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5030000012f0 at pc 0x55eafca6599b bp 0x7ffdd1591570 sp 0x7ffdd1591568
> READ of size 8 at 0x5030000012f0 thread T0
> 
> Fix can be found here: https://sqlite.org/src/info/63595b74956a9391
> 
> Timeline
> --------
> Date reported: 07/15/2025
> Date fixed: 07/16/2025
> Date disclosed: 08/15/2025

See the above URL for Further Analysis.

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.