MGASA-2022-0161

Source
https://advisories.mageia.org/MGASA-2022-0161.html
Import Source
https://advisories.mageia.org/MGASA-2022-0161.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0161
Related
Published
2022-05-06T20:16:39Z
Modified
2022-05-06T19:27:57Z
Summary
Updated lighttpd packages fix security vulnerability
Details

In lighttpd 1.4.46 through 1.4.63, the modextforwardForwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system. (CVE-2022-22707)

References
Credits

Affected packages

Mageia:8 / lighttpd

Package

Name
lighttpd
Purl
pkg:rpm/mageia/lighttpd?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.59-1.1.mga8

Ecosystem specific

{
    "section": "core"
}