First published: Thu Oct 06 2022(Updated: )
A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lighttpd | 1.4.53-4+deb10u2 1.4.53-4+deb10u3 1.4.59-1+deb11u2 1.4.69-1 | |
Lighttpd Lighttpd | >=1.4.56<1.4.67 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41556 is a vulnerability in lighttpd versions 1.4.56 through 1.4.66 that could lead to a denial of service due to connection-slot exhaustion.
CVE-2022-41556 affects lighttpd versions 1.4.56 through 1.4.66 by causing a resource leak in gw_backend.c, leading to connection-slot exhaustion and a denial of service.
CVE-2022-41556 has a severity rating of 7.5 (high).
To fix CVE-2022-41556, it is recommended to update lighttpd to version 1.4.67 or apply the necessary patches provided by the vendor.
More information about CVE-2022-41556 can be found in the following references: [link1], [link2], [link3].