Deutsch   English   Fran├žais   Italiano  
<FaHNf-aH6g-1@gated-at.bofh.it>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod
From: Salvatore Bonaccorso <carnil@debian.org>
Newsgroups: linux.debian.announce.security
Subject: [SECURITY] [DSA 5243-1] lighttpd security update
Date: Wed, 28 Sep 2022 18:10:01 +0200
Message-ID: <FaHNf-aH6g-1@gated-at.bofh.it>
X-Original-To: debian-security-announce@lists.debian.org
X-Mailbox-Line: From debian-security-announce-request@lists.debian.org  Wed Sep 28 16:05:45 2022
Old-Return-Path: <carnil@seger.debian.org>
X-Amavis-Spam-Status: No, score=-113.472 tagged_above=-10000 required=5.3
	tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.082,
	DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1,
	DKIM_VALID_EF=-0.1, FOURLA=0.1, FVGT_m_MULTI_ODD=0.02,
	LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3,
	USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100]
	autolearn=ham autolearn_force=no
Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org;
	s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version:
	Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description:
	In-Reply-To:References; bh=WJ9j+uzK4zWVFMHkAEXm8quYBaKmQQ9os3LPdqJn9ac=; b=uU
	F84T0BcgCXgnPuQ8Ytz24GVkTaNN/CEXHUiScvbcXZz9HFhmF0Gr7+RJGPzeKvBvpGawtsbnULiKf
	ifQ8rzLd1ysDDvaJVzwLPWFXcfwU85oqNtwOQpyCdpXkgIFhUBsmRZvjwSXjswWC3vTS+X9borMiD
	isKsnnimNmrR1IBtIDw8gDE3PMxFiYc+pUfYzbbZpTR9k628sdxc0KIgXUtVXRfOzAgjlXb26mA8z
	qT8SH0ZVMsvPfUz+rXzj0A8lDFNSwiI6XMSCBp/8vUH0YYvTfQkibibqRH9oPGAi/sRjL26Yfonio
	bZau3mqDdJ0TRfugqNaYjsG67ioGiDKA==;
X-Debian: PGP check passed for security officers
Priority: urgent
Reply-To: debian-security-announce-request@lists.debian.org
X-Mailing-List: <debian-security-announce@lists.debian.org> archive/latest/4141
List-ID: <debian-security-announce.lists.debian.org>
List-URL: <http://lists.debian.org/debian-security-announce/>
List-Archive: https://lists.debian.org/msgid-search/E1odZYl-00C9EO-Kv@seger.debian.org
Approved: robomod@news.nic.it
Lines: 57
Organization: linux.* mail to news gateway
Sender: robomod@news.nic.it
X-Original-Date: Wed, 28 Sep 2022 16:05:19 +0000
X-Original-Message-ID: <E1odZYl-00C9EO-Kv@seger.debian.org>
Bytes: 4703

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5243-1                   security@debian.org
https://www.debian.org/security/                            Helmut Grohne
September 28, 2022                    https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lighttpd
CVE ID         : CVE-2022-37797 CVE-2022-41556

Several vulnerabilities were discovered in lighttpd, a fast webserver
with minimal memory footprint.

CVE-2022-37797

    An invalid HTTP request (websocket handshake) may cause a NULL
    pointer dereference in the wstunnel module.

CVE-2022-41556

    A resource leak in mod_fastcgi and mod_scgi could lead to a denial
    of service after a large number of bad HTTP requests.

For the stable distribution (bullseye), these problems have been fixed in
version 1.4.59-1+deb11u2.

We recommend that you upgrade your lighttpd packages.

For the detailed security status of lighttpd please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/lighttpd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=usZG
-----END PGP SIGNATURE-----