Source: libfcgi Version: 2.4.2-2.1 Severity: grave Tags: security upstream Forwarded: https://github.com/FastCGI-Archives/fcgi2/issues/67 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 2.4.2-2
Hi, The following vulnerability was published for libfcgi. CVE-2025-23016[0]: | FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow | (and resultant heap-based buffer overflow) via crafted nameLen or | valueLen values in data to the IPC socket. This occurs in ReadParams | in fcgiapp.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-23016 https://www.cve.org/CVERecord?id=CVE-2025-23016 [1] https://github.com/FastCGI-Archives/fcgi2/issues/67 Regards, Salvatore