Several vulnerabilities were discovered in lighttpd, a fast webserver
with minimal memory footprint.
* [CVE-2022-37797](https://security-tracker.debian.org/tracker/CVE-2022-37797)
An invalid HTTP request (websocket handshake) may cause a NULL
pointer dereference in the wstunnel module.
* [CVE-2022-41556](https://security-tracker.debian.org/tracker/CVE-2022-41556)
A resource leak in mod_fastcgi and mod_scgi could lead to a denial
of service after a large number of bad HTTP requests.
For the stable distribution (bullseye), these problems have been fixed in
version 1.4.59-1+deb11u2.
We recommend that you upgrade your lighttpd packages.
For the detailed security status of lighttpd please refer to its
security tracker page at:
[
https://security-tracker.debian.org/tracker/lighttpd](https://security-tracker.debian.org/tracker/lighttpd)Read More
References
Back to Main