First published: Thu May 09 2024(Updated: )
USN-6729-1 fixed vulnerabilities in Apache HTTP Server. The update lead to the discovery of a regression in Fossil with regards to the handling of POST requests that do not have a Content-Length field set. This update fixes the problem. We apologize for the inconvenience.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/fossil | <1:2.23-1ubuntu0.1 | 1:2.23-1ubuntu0.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/fossil | <1:2.22-1ubuntu0.1 | 1:2.22-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/fossil | <1:2.18-1ubuntu0.1 | 1:2.18-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/fossil | <1:2.10-1ubuntu0.1 | 1:2.10-1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/fossil | <1:2.5-1ubuntu0.1~esm1 | 1:2.5-1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/fossil | <1:1.33-3ubuntu0.1~esm1 | 1:1.33-3ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6770-1 is classified as important.
To fix USN-6770-1, update the Fossil package to the fixed version provided in the advisory for your Ubuntu version.
USN-6770-1 addresses a regression in Fossil that affects the handling of POST requests without a Content-Length field.
USN-6770-1 affects multiple Ubuntu versions, including 16.04, 18.04, 20.04, 22.04, 23.10, and 24.04.
USN-6770-1 is not classified as critical but is considered important due to the impact on Fossil functionality.