Search CVE reports
1 – 10 of 37 results
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to...
4 affected packages
h2o, haproxy, lighttpd, varnish
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
h2o | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
haproxy | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
lighttpd | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
varnish | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 4
A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | Not affected | Fixed | Not affected | Not affected |
In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | Not affected | Vulnerable | Vulnerable | Not affected |
Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 4
In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | — | Fixed | Fixed | Not affected |
lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | — | — | — | Not affected |
There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests.
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | Not affected | Not affected | Not affected | Needs evaluation |
Some fixes available 3 of 4
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the...
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | — | Not affected | Not affected | Fixed |
Some fixes available 2 of 7
Mitigation for HTTPoxy vulnerability
1 affected package
lighttpd
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
lighttpd | — | — | — | Not affected |