|
|
Log in / Subscribe / Register

Mageia alert MGASA-2022-0161 (lighttpd)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2022-0161: Updated lighttpd packages fix security vulnerability
Date:  Fri, 06 May 2022 22:18:15 +0200
Message-ID:  <20220506201815.DC1BB9FDBE@duvel.mageia.org>
Archive-link:  Article

MGASA-2022-0161 - Updated lighttpd packages fix security vulnerability Publication date: 06 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0161.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-22707 Description: In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system. (CVE-2022-22707) References: - https://bugs.mageia.org/show_bug.cgi?id=29877 - https://www.debian.org/security/2022/dsa-5040 - https://lists.opensuse.org/archives/list/security-announc... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... SRPMS: - 8/core/lighttpd-1.4.59-1.1.mga8


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds