Your message dated Sat, 06 Sep 2025 12:14:50 +0100
with message-id 
<ee4c0876608d99eb3f8b333b556fbd92e7a652eb.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 12.12
has caused the Debian Bug report #1111835,
regarding bookworm-pu: package libfcgi/2.4.2-2+deb12u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1111835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111835
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: [email protected]
Control: affects -1 + src:libfcgi
User: [email protected]
Usertags: pu

Low impact security issue, debdiff below.

Cheers,
        Moritz

diff -Nru libfcgi-2.4.2/debian/changelog libfcgi-2.4.2/debian/changelog
--- libfcgi-2.4.2/debian/changelog      2020-01-01 01:00:01.000000000 +0100
+++ libfcgi-2.4.2/debian/changelog      2025-05-26 20:18:11.000000000 +0200
@@ -1,3 +1,9 @@
+libfcgi (2.4.2-2+deb12u1) bookworm; urgency=medium
+
+  * CVE-2025-23016 (Closes: #1092774)
+
+ -- Moritz Mühlenhoff <[email protected]>  Mon, 26 May 2025 20:18:11 +0200
+
 libfcgi (2.4.2-2) unstable; urgency=medium
 
   * Move to unstable: no changes required.
diff -Nru libfcgi-2.4.2/debian/patches/CVE-2025-23016.patch 
libfcgi-2.4.2/debian/patches/CVE-2025-23016.patch
--- libfcgi-2.4.2/debian/patches/CVE-2025-23016.patch   1970-01-01 
01:00:00.000000000 +0100
+++ libfcgi-2.4.2/debian/patches/CVE-2025-23016.patch   2025-05-26 
20:18:05.000000000 +0200
@@ -0,0 +1,29 @@
+From b0eabcaf4d4f371514891a52115c746815c2ff15 Mon Sep 17 00:00:00 2001
+From: Pycatchown <[email protected]>
+Date: Tue, 8 Apr 2025 17:39:30 +0200
+Subject: [PATCH] Update fcgiapp.c
+
+--- libfcgi-2.4.2.orig/libfcgi/fcgiapp.c
++++ libfcgi-2.4.2/libfcgi/fcgiapp.c
+@@ -1173,6 +1173,10 @@ static int ReadParams(Params *paramsPtr,
+           }
+             nameLen = ((nameLen & 0x7f) << 24) + (lenBuff[0] << 16)
+                     + (lenBuff[1] << 8) + lenBuff[2];
++          if (nameLen >= INT_MAX) {
++                SetError(stream, FCGX_PARAMS_ERROR);
++                return -1;
++          }
+         }
+         if((valueLen = FCGX_GetChar(stream)) == EOF) {
+             SetError(stream, FCGX_PARAMS_ERROR);
+@@ -1185,6 +1189,10 @@ static int ReadParams(Params *paramsPtr,
+           }
+             valueLen = ((valueLen & 0x7f) << 24) + (lenBuff[0] << 16)
+                     + (lenBuff[1] << 8) + lenBuff[2];
++          if (valueLen >= INT_MAX) {
++                SetError(stream, FCGX_PARAMS_ERROR);
++                return -1;
++          }
+         }
+         /*
+          * nameLen and valueLen are now valid; read the name and value
diff -Nru libfcgi-2.4.2/debian/patches/series 
libfcgi-2.4.2/debian/patches/series
--- libfcgi-2.4.2/debian/patches/series 1970-01-01 01:00:00.000000000 +0100
+++ libfcgi-2.4.2/debian/patches/series 2025-05-26 20:17:51.000000000 +0200
@@ -0,0 +1 @@
+CVE-2025-23016.patch

--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 12.12

Hi,

Each of the updates referenced by these requests was included in
today's 12.12 point release for bookworm.

Regards,

Adam

--- End Message ---

Reply via email to