Path: ...!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod From: Salvatore Bonaccorso Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5243-1] lighttpd security update Date: Wed, 28 Sep 2022 18:10:01 +0200 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Wed Sep 28 16:05:45 2022 Old-Return-Path: X-Amavis-Spam-Status: No, score=-113.472 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.082, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=WJ9j+uzK4zWVFMHkAEXm8quYBaKmQQ9os3LPdqJn9ac=; b=uU F84T0BcgCXgnPuQ8Ytz24GVkTaNN/CEXHUiScvbcXZz9HFhmF0Gr7+RJGPzeKvBvpGawtsbnULiKf ifQ8rzLd1ysDDvaJVzwLPWFXcfwU85oqNtwOQpyCdpXkgIFhUBsmRZvjwSXjswWC3vTS+X9borMiD isKsnnimNmrR1IBtIDw8gDE3PMxFiYc+pUfYzbbZpTR9k628sdxc0KIgXUtVXRfOzAgjlXb26mA8z qT8SH0ZVMsvPfUz+rXzj0A8lDFNSwiI6XMSCBp/8vUH0YYvTfQkibibqRH9oPGAi/sRjL26Yfonio bZau3mqDdJ0TRfugqNaYjsG67ioGiDKA==; X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4141 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/E1odZYl-00C9EO-Kv@seger.debian.org Approved: robomod@news.nic.it Lines: 57 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Wed, 28 Sep 2022 16:05:19 +0000 X-Original-Message-ID: Bytes: 4703 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5243-1 security@debian.org https://www.debian.org/security/ Helmut Grohne September 28, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : lighttpd CVE ID : CVE-2022-37797 CVE-2022-41556 Several vulnerabilities were discovered in lighttpd, a fast webserver with minimal memory footprint. CVE-2022-37797 An invalid HTTP request (websocket handshake) may cause a NULL pointer dereference in the wstunnel module. CVE-2022-41556 A resource leak in mod_fastcgi and mod_scgi could lead to a denial of service after a large number of bad HTTP requests. For the stable distribution (bullseye), these problems have been fixed in version 1.4.59-1+deb11u2. We recommend that you upgrade your lighttpd packages. For the detailed security status of lighttpd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/lighttpd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmM0cCVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TU5Q/9Ha7yNcTtRk9Dzmt6zwLSp2OVcyiURMKsZgWYuXjJdvA4LZI6WqU85OEn DCeXHA4YTCi6yZBsQy4HdQ0DBcxJGAKVsyMegKJew3WLxs7Cp4ik/moVkrDdaIWP 1YlzbGTgVWdWl8P1hVr8onJP5PN+6in2Ib89+CPexqxJ91uYz01gzCQuzhJk/AdE Vbchn8fNTHqpIkjeZOrm4daKoHzgX4DP4tgxVbpHstNMsojJ2p03cBFs3k3pZVD+ JNWiEFrgXU+Lj9iQi3u/LH6xYYkAFw12oK4rJnP73L9wfZa+Ak4UyFXvpSTp5vyN z6jNYPZt2fZVQjG5zaZ1NEpnUQImA0kGlttGz15/BzB03Dy+5Tr5uRL1mwH/z06y aT26ZCC8TWUhnaqN3ZrneekUmMbOaQmzR7f+z9EZcaWGKdYyyLkMx46Ws+Q4blnf TUqoN1Sphzt6JcGqTEKRe89YS+AsYP1Q1u4JUIHfPxc++0+myh6VJ0U+NR5rihgl 4qqXlhiYHTrQ748Kli2e8i3Q4osoRmdGIbLl4gttCX4r88CdKOHmCXx7GccS13Vq iYTVtX5vXnY08MhbWOJjqRqIxeN8ou26yBGtrkzixD+Dee26fZIx/Nk5LGU05Ld3 rpuAjg13gckqLn/p9hc5OLB+NNQ3YhOwXbkkmSuwNxToy/aO2q0= =usZG -----END PGP SIGNATURE-----