{"id":"USN-5903-1","summary":"lighttpd vulnerabilities","details":"It was discovered that lighttpd incorrectly handled certain inputs, which could\nresult in a stack buffer overflow. A remote attacker could possibly use this\nissue to cause a denial of service (DoS). (CVE-2022-22707, CVE-2022-41556)\n","modified":"2026-04-27T16:47:17.912981661Z","published":"2023-02-28T15:42:16Z","related":["UBUNTU-CVE-2022-22707","UBUNTU-CVE-2022-41556"],"upstream":["CVE-2022-22707","CVE-2022-41556","UBUNTU-CVE-2022-22707","UBUNTU-CVE-2022-41556"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5903-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-22707"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-41556"}],"affected":[{"package":{"name":"lighttpd","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/lighttpd@1.4.55-1ubuntu1.20.04.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.55-1ubuntu1.20.04.2"}]}],"versions":["1.4.53-4ubuntu2","1.4.54-2ubuntu1","1.4.55-1ubuntu1","1.4.55-1ubuntu1.20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-authn-gssapi"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-authn-pam"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-authn-sasl"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-cml"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-geoip"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-magnet"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-maxminddb"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-trigger-b4-dl"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-vhostdb-dbi"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-vhostdb-pgsql"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-mod-webdav"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-modules-ldap"},{"binary_version":"1.4.55-1ubuntu1.20.04.2","binary_name":"lighttpd-modules-mysql"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-22707"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5903-1.json"}},{"package":{"name":"lighttpd","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/lighttpd@1.4.63-1ubuntu3.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.63-1ubuntu3.1"}]}],"versions":["1.4.59-1ubuntu2","1.4.59-1ubuntu3","1.4.63-1ubuntu1","1.4.63-1ubuntu2","1.4.63-1ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-authn-gssapi"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-authn-pam"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-authn-sasl"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-deflate"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-geoip"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-maxminddb"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-mbedtls"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-nss"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-openssl"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-trigger-b4-dl"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-vhostdb-pgsql"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-webdav"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-mod-wolfssl"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-modules-dbi"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-modules-ldap"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-modules-lua"},{"binary_version":"1.4.63-1ubuntu3.1","binary_name":"lighttpd-modules-mysql"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-22707"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-41556"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5903-1.json"}}],"schema_version":"1.7.5"}