CVE-2025-23016

NameCVE-2025-23016
DescriptionFastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1092774

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libfcgi (PTS)bookworm, bullseye2.4.2-2vulnerable
trixie2.4.2-2.1vulnerable
sid2.4.5-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libfcgisource(unstable)2.4.5-0.11092774

Notes

[bookworm] - libfcgi <no-dsa> (Minor issue)
[bullseye] - libfcgi <postponed> (Minor issue, revisit when fixed upstream)
https://github.com/FastCGI-Archives/fcgi2/issues/67
https://github.com/FastCGI-Archives/fcgi2/pull/74
Fixed by: https://github.com/FastCGI-Archives/fcgi2/commit/b0eabcaf4d4f371514891a52115c746815c2ff15 (2.4.5)

Search for package or bug name: Reporting problems