[SECURITY] [DSA 5040-1] lighttpd security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5040-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 11, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : lighttpd
CVE ID : CVE-2022-22707
An out-of-bounds memory access was discovered in the mod_extforward plugin of
the lighttpd web server, which may result in denial of service.
For the oldstable distribution (buster), this problem has been fixed
in version 1.4.53-4+deb10u2.
For the stable distribution (bullseye), this problem has been fixed in
version 1.4.59-1+deb11u1.
We recommend that you upgrade your lighttpd packages.
For the detailed security status of lighttpd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lighttpd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Fuu5
-----END PGP SIGNATURE-----
Reply to: