Important: lighttpd
Discription

**Issue Overview:**

In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition. (CVE-2022-37797)

**Affected Packages:**

lighttpd

**Issue Correction:**
Run _yum update lighttpd_ to update your system.

**New Packages:**

i686:
    lighttpd-mod_authn_gssapi-1.4.53-1.37.amzn1.i686
    lighttpd-debuginfo-1.4.53-1.37.amzn1.i686
    lighttpd-fastcgi-1.4.53-1.37.amzn1.i686
    lighttpd-mod_mysql_vhost-1.4.53-1.37.amzn1.i686
    lighttpd-1.4.53-1.37.amzn1.i686
    lighttpd-mod_authn_mysql-1.4.53-1.37.amzn1.i686
    lighttpd-mod_geoip-1.4.53-1.37.amzn1.i686
    lighttpd-mod_authn_pam-1.4.53-1.37.amzn1.i686

src:
    lighttpd-1.4.53-1.37.amzn1.src

x86_64:
    lighttpd-fastcgi-1.4.53-1.37.amzn1.x86_64
    lighttpd-mod_authn_mysql-1.4.53-1.37.amzn1.x86_64
    lighttpd-mod_geoip-1.4.53-1.37.amzn1.x86_64
    lighttpd-mod_authn_gssapi-1.4.53-1.37.amzn1.x86_64
    lighttpd-mod_authn_pam-1.4.53-1.37.amzn1.x86_64
    lighttpd-mod_mysql_vhost-1.4.53-1.37.amzn1.x86_64
    lighttpd-debuginfo-1.4.53-1.37.amzn1.x86_64
    lighttpd-1.4.53-1.37.amzn1.x86_64

### Additional References

Red Hat: [CVE-2022-37797]()

Mitre: [CVE-2022-37797]()Read More

Back to Main

Subscribe for the latest news: