Mageia 2022-0161: lighttpd security update
Summary
In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function
of the mod_extforward plugin has a stack-based buffer overflow (4 bytes
representing -1), as demonstrated by remote denial of service (daemon
crash) in a non-default configuration. The non-default configuration
requires handling of the Forwarded header in a somewhat unusual manner.
Also, a 32-bit system is much more likely to be affected than a 64-bit
system. (CVE-2022-22707)
References
- https://bugs.mageia.org/show_bug.cgi?id=29877
- https://www.debian.org/security/2022/dsa-5040
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6P5G6MJW4Q5RKKPO7TS5CLAAEQ2QUYBE/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22707
Resolution
MGASA-2022-0161 - Updated lighttpd packages fix security vulnerability
SRPMS
- 8/core/lighttpd-1.4.59-1.1.mga8