Bugzilla – Bug 1203358
VUL-0: CVE-2022-37797: lighttpd: null pointer dereference in mod_wstunnel
Last modified: 2022-09-29 13:31:21 UTC
CVE-2022-37797 In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37797 https://www.cve.org/CVERecord?id=CVE-2022-37797 https://redmine.lighttpd.net/issues/3165
mod_wstunnel was added in 1.4.46, thus SUSE codestream is not affected. openSUSE affected: _ openSUSE:Backports:SLE-15-SP4 - openSUSE:Backports:SLE-15-SP3:Update - openSUSE:Factory
submitted
This is an autogenerated message for OBS integration: This bug (1203358) was mentioned in https://build.opensuse.org/request/show/1003391 Factory / lighttpd https://build.opensuse.org/request/show/1003392 Backports:SLE-15-SP3+Backports:SLE-15-SP4 / lighttpd
This is an autogenerated message for OBS integration: This bug (1203358) was mentioned in https://build.opensuse.org/request/show/1006863 Backports:SLE-15-SP3+Backports:SLE-15-SP4 / lighttpd
openSUSE-SU-2022:10132-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1203358 CVE References: CVE-2022-37797 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): lighttpd-1.4.66-bp154.2.3.1 openSUSE Backports SLE-15-SP3 (src): lighttpd-1.4.66-bp153.2.9.1
done