Mageia alert MGASA-2022-0161 (lighttpd)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2022-0161: Updated lighttpd packages fix security vulnerability | |
| Date: | Fri, 06 May 2022 22:18:15 +0200 | |
| Message-ID: | <20220506201815.DC1BB9FDBE@duvel.mageia.org> | |
| Archive-link: | Article |
MGASA-2022-0161 - Updated lighttpd packages fix security vulnerability Publication date: 06 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0161.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-22707 Description: In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system. (CVE-2022-22707) References: - https://bugs.mageia.org/show_bug.cgi?id=29877 - https://www.debian.org/security/2022/dsa-5040 - https://lists.opensuse.org/archives/list/security-announc... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... SRPMS: - 8/core/lighttpd-1.4.59-1.1.mga8
