[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5243-1] lighttpd security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5243-1                   security@debian.org
https://www.debian.org/security/                            Helmut Grohne
September 28, 2022                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lighttpd
CVE ID         : CVE-2022-37797 CVE-2022-41556

Several vulnerabilities were discovered in lighttpd, a fast webserver
with minimal memory footprint.

CVE-2022-37797

    An invalid HTTP request (websocket handshake) may cause a NULL
    pointer dereference in the wstunnel module.

CVE-2022-41556

    A resource leak in mod_fastcgi and mod_scgi could lead to a denial
    of service after a large number of bad HTTP requests.

For the stable distribution (bullseye), these problems have been fixed in
version 1.4.59-1+deb11u2.

We recommend that you upgrade your lighttpd packages.

For the detailed security status of lighttpd please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/lighttpd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=usZG
-----END PGP SIGNATURE-----


Reply to: