FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
{ "binaries": [ { "binary_version": "2.4.0-8.3", "binary_name": "libfcgi0ldbl" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-23016.json"
{ "binaries": [ { "binary_version": "2.4.0-10", "binary_name": "libfcgi-bin" }, { "binary_version": "2.4.0-10", "binary_name": "libfcgi0ldbl" } ] }
{ "binaries": [ { "binary_version": "2.4.0-10build1", "binary_name": "libfcgi-bin" }, { "binary_version": "2.4.0-10build1", "binary_name": "libfcgi0ldbl" } ] }
{ "binaries": [ { "binary_version": "2.4.2-2ubuntu0.1", "binary_name": "libfcgi-bin" }, { "binary_version": "2.4.2-2ubuntu0.1", "binary_name": "libfcgi0ldbl" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.4.2-2.1ubuntu0.24.04.1", "binary_name": "libfcgi-bin" }, { "binary_version": "2.4.2-2.1ubuntu0.24.04.1", "binary_name": "libfcgi0t64" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "2.4.5-0.1", "binary_name": "libfcgi-bin" }, { "binary_version": "2.4.5-0.1", "binary_name": "libfcgi0t64" } ], "availability": "No subscription required" }