Fedora Linux 8578 Published by

A lighttpd security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: lighttpd-1.4.67-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-c26b19568d
2022-10-05 13:49:40.470430
--------------------------------------------------------------------------------

Name : lighttpd
Product : Fedora 35
Version : 1.4.67
Release : 1.fc35
URL :   http://www.lighttpd.net/
Summary : Lightning fast webserver with light system requirements
Description :
lighttpd (pronounced /lighty/) is a secure, fast, compliant, and very flexible
web server that has been optimized for high-performance environments. lighttpd
uses memory and CPU efficiently and has lower resource use than other popular
web servers. Its advanced feature-set (FastCGI, CGI, Auth, Output-Compression,
URL-Rewriting and much more) make lighttpd the perfect web server for all
systems, small and large.

--------------------------------------------------------------------------------
Update Information:

1.4.67
--------------------------------------------------------------------------------
ChangeLog:

* Mon Sep 19 2022 Gwyn Ciesla - 1.4.67-1
- 1.4.67
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2130967 - CVE-2022-41556 lighttpd: resource leak can lead to denial of service [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2130967
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-c26b19568d' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________