==========================================================================
Ubuntu Security Notice USN-3643-1
May 09, 2018
wget vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Wget could be made to inject arbitrary cookie values.
Software Description:
– wget: retrieves files from the web
Details:
It was discovered that Wget incorrectly handled certain inputs.
An attacker could possibly use this to inject arbitrary cookie values.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
wget 1.19.4-1ubuntu2.1
Ubuntu 17.10:
wget 1.19.1-3ubuntu1.2
Ubuntu 16.04 LTS:
wget 1.17.1-1ubuntu1.4
Ubuntu 14.04 LTS:
wget 1.15-1ubuntu1.14.04.4
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3643-1
CVE-2018-0494
Package Information:
https://launchpad.net/ubuntu/+source/wget/1.19.4-1ubuntu2.1
https://launchpad.net/ubuntu/+source/wget/1.19.1-3ubuntu1.2
https://launchpad.net/ubuntu/+source/wget/1.17.1-1ubuntu1.4
https://launchpad.net/ubuntu/+source/wget/1.15-1ubuntu1.14.04.4—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=EmoP
—–END PGP SIGNATURE—–
—
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
==========================================================================
Ubuntu Security Notice USN-3643-2
May 09, 2018
wget vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
Wget could be made to inject arbitrary cookie values.
Software Description:
– wget: retrieves files from the web
Details:
USN-3643-1 fixed a vulnerability in Wget. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that Wget incorrectly handled certain inputs.
An attacker could possibly use this to inject arbitrary cookie values.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
wget 1.13.4-2ubuntu1.6
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3643-2
https://usn.ubuntu.com/usn/usn-3643-1
CVE-2018-0494—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=6qcB
—–END PGP SIGNATURE—–
—