==========================================================================
Ubuntu Security Notice USN-3012-1
June 20, 2016
wget vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Wget could be made to overwrite files.
Software Description:
– wget: retrieves files from the web
Details:
Dawid Golunski discovered that Wget incorrectly handled filenames when
being redirected from an HTTP to an FTP URL. A malicious server could
possibly use this issue to overwrite local files.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
wget 1.17.1-1ubuntu1.1
Ubuntu 15.10:
wget 1.16.1-1ubuntu1.1
Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.2
Ubuntu 12.04 LTS:
wget 1.13.4-2ubuntu1.4
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3012-1
CVE-2016-4971
Package Information:
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.16.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.2
https://launchpad.net/ubuntu/+source/wget/1.13.4-2ubuntu1.4
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=3aKn
—–END PGP SIGNATURE—–
—