CVE-2025-40907

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40907
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40907.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-40907
Related
Published
2025-05-16T13:15:52Z
Modified
2025-05-17T14:25:03.289052Z
Summary
[none]
Details

FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library.

The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

References

Affected packages

Debian:11 / libfcgi-perl

Package

Name
libfcgi-perl
Purl
pkg:deb/debian/libfcgi-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.79+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libfcgi-perl

Package

Name
libfcgi-perl
Purl
pkg:deb/debian/libfcgi-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.79+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libfcgi-perl

Package

Name
libfcgi-perl
Purl
pkg:deb/debian/libfcgi-perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.79+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/perl-catalyst/fcgi

Affected ranges

Type
GIT
Repo
https://github.com/perl-catalyst/fcgi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.67_01
0.67_01-RC1
0.68
0.68_01
0.68_02
0.69
0.70
0.71
0.71_01
0.71_02
0.71_03
0.72
0.73
0.74
0.75
0.76
0.77
0.78
0.79
0.80
0.81
0.82