Source: libfcgi
Version: 2.4.2-2.1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/FastCGI-Archives/fcgi2/issues/67
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 2.4.2-2

Hi,

The following vulnerability was published for libfcgi.

CVE-2025-23016[0]:
| FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow
| (and resultant heap-based buffer overflow) via crafted nameLen or
| valueLen values in data to the IPC socket. This occurs in ReadParams
| in fcgiapp.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-23016
    https://www.cve.org/CVERecord?id=CVE-2025-23016
[1] https://github.com/FastCGI-Archives/fcgi2/issues/67

Regards,
Salvatore

Reply via email to