CVE-2025-23016

NameCVE-2025-23016
DescriptionFastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1092774

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libfcgi (PTS)bookworm, bullseye2.4.2-2vulnerable
sid, trixie2.4.2-2.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libfcgisource(unstable)(unfixed)1092774

Notes

[bullseye] - libfcgi <postponed> (Minor issue, revisit when fixed upstream)
https://github.com/FastCGI-Archives/fcgi2/issues/67

Search for package or bug name: Reporting problems