[ubuntu/xenial-updates] wget 1.17.1-1ubuntu1.3 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Thu Oct 26 17:58:23 UTC 2017
wget (1.17.1-1ubuntu1.3) xenial-security; urgency=medium
* SECURITY UPDATE: race condition leading to access list bypass
- debian/patches/CVE-2016-7098-1.patch: limit file mode in src/http.c.
- debian/patches/CVE-2016-7098-2.patch: add .tmp to temp files in
src/http.c.
- debian/patches/CVE-2016-7098-3.patch: replace asprintf by aprint in
src/http.c.
- CVE-2016-7098
* SECURITY UPDATE: CRLF injection in url_parse
- debian/patches/CVE-2017-6508.patch: check for invalid control
characters in src/url.c.
- CVE-2017-6508
* SECURITY UPDATE: stack overflow in HTTP protocol handling
- debian/patches/CVE-2017-13089.patch: return error on negative chunk
size in src/http.c.
- CVE-2017-13089
* SECURITY UPDATE: heap overflow in HTTP protocol handling
- debian/patches/CVE-2017-13090.patch: stop processing on negative
chunk size in src/retr.c.
- CVE-2017-13090
Date: 2017-10-24 11:11:36.843010+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list