it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5040-1] lighttpd security update
- Date: Tue, 11 Jan 2022 19:42:26 +0000
- List-archive: https://lists.debian.org/msgid-search/20220111194226.GA28621 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=WW3iLrfS4SUit9VJcZhc6c/sALXHpPusYpP1ByFcwGo=; b=rz TM/3quTd8UsvEf70kiQsn6LuhGzKErlnsKAh/GA60Xdz/Sz++aFD6xZfMxdulkTphPbHztrm0WZ+l m2MWjVFiQKOhcvFPKqtIvfbGy3MqTawb4friRUuGYLodTZMJE/4anaDwfCYqnD5N9+0HFghI4OZiT O8HVqOWWC60SVhQ6FE+eFlmYlhydmGPHi0X1sJeorwR0E+A7u+7UC/yxZ2fheI6rZOuGAahnT3CZu JWCvhD4y1+Or4LhLW5TztIV7hwsv/AoVfvuh5kR7G3GnNWU0CSW3U2mh+rzDER4JZ+t5Z3TOT5Vut OWGMOCYQCuA9o9Kd8aD3p5yFErW8nz8w==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Tue, 11 Jan 2022 19:42:43 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <_Ix3ZqTfVI.A.rTC.z2d3hB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5040-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 11, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : lighttpd
CVE ID : CVE-2022-22707
An out-of-bounds memory access was discovered in the mod_extforward plugin of
the lighttpd web server, which may result in denial of service.
For the oldstable distribution (buster), this problem has been fixed
in version 1.4.53-4+deb10u2.
For the stable distribution (bullseye), this problem has been fixed in
version 1.4.59-1+deb11u1.
We recommend that you upgrade your lighttpd packages.
For the detailed security status of lighttpd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lighttpd
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmHd3UUACgkQEMKTtsN8
TjZdSQ/+Jiod4ncNyWTJKFmdLtiZiUl0Ut2e/lh0T2gq5o4SE8jsLF56rTIR3PX7
yFubLM31G0z51+bvBGaciLygJICRadN1pJPxdlD8SfuNV6Osj4G9SQOM7A4euth8
MjBXou1HdamFZRW8mJHBld4mdXgyrZHdxcuksW+5Q1ZJ7pLrB9lqsG0OEVTcMrIA
iH/pdpstprpLe61Sa6v5HyyKRDNH1n5m0H5JJ/GrF/aVomy8sQoUBcHg+6f9cr67
QXpT//7XP1hcq3XOWXFnvZvvx6LjR3wKdctBtKFI7B/Gfo4+NjFJ+lNwr+PCbLfY
cvVE5PDNULMZ3q3DpwkOLv3WL9J84bfXQwJrbdD33+PoJmb6ePIdB1VTjsILKQGP
XC1I9K/QPXDgfAHuT5qPIHHqfj4ebDbfzNr0iZWtPW+ow8AAajbEMgoHTVmnMpPc
JekVtUacVvBCTJR2o/5LpOPYhlmn9sCNf43HT8CEe8IUjxuhdXHiLhKN3HgiW0Y3
KCdXdCqMcyUp2V10ZpcxNqNVrEtTThpwKpEhO9pBsjlCEh+ewS8DxXvgpyS0qeGE
Zl6y9G6+oYFgVMWaBZWcq3vpdtTBFZSTka74RSZCuEprQLwzwqeuyM9ypeOgaW7I
wfwl5Tp5CZ5MtuvKBJqkMCIx8xo+1SABpkLkutNxOXsNf/9ffZ0=
=Fuu5
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5040-1] lighttpd security update, Moritz Muehlenhoff, 11.01.2022
Archiv bereitgestellt durch MHonArc 2.6.24.