Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN269 _____________________________________________________________________ DATE : 30/04/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running fastcgi library versions prior to 2.4.5. ===================================================================== https://www.openwall.com/lists/oss-security/2025/04/23/4 _____________________________________________________________________ Version 2.4.5 of the fastcgi library was released last week: https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5 It fixed CVE-2025-23016, which is described as "an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c." The upstream bug report can be found at: https://github.com/FastCGI-Archives/fcgi2/issues/67 and a detailed writeup from the discoverers at: https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library which suggests both upgrading to the fixed version and "limiting potential remote access to the FastCGI socket by declaring it as a UNIX socket." -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================