| Summary: | wget new security issue CVE-2017-6508 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, lists.jjorge, marja11, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA5-64-OK advisory MGA5-32-OK | ||
| Source RPM: | wget-1.19.1-1.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2017-04-01 03:03:01 CEST
David Walser
2017-04-01 03:03:10 CEST
Whiteboard:
(none) =>
MGA5TOO Assigning to all packagers collectively, since there is no registered maintainer for this package. CC:
(none) =>
marja11 I have registered as maintainer, so I'll take this one. Status:
NEW =>
ASSIGNED Pushed to cauldron. Same patch used for 1.15 version in MGA5 Suggested Advisory : Wget till version 1.19.1 does not ensure no control characters are used in the url. This security update reject control characters in host part of URL. Ref : https://nvd.nist.gov/vuln/detail/CVE-2017-6508 RPMS: only one i586 x86_64 and SRPM in core/updates_testing wget-1.15-5.2.mga5 Version:
Cauldron =>
5 Mageia 5 x86_64. From http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html Before the update ... $ wget 'http://127.0.0.1%0d%0aCookie%3a hi%0a/' --2017-04-03 16:47:06-- http://[127.0.0.1%0D%0Acookie:%20hi%0A]/ Resolving 127.0.0.1\r\ncookie: hi\n (127.0.0.1\r\ncookie: hi\n)... 127.0.0.1 Connecting to 127.0.0.1 cookie: hi (127.0.0.1 cookie: hi )|127.0.0.1|:80... connected. HTTP request sent, awaiting response... 400 Bad Request 2017-04-03 16:47:06 ERROR 400: Bad Request. With the update ... $ wget 'http://127.0.0.1%0d%0aCookie%3a hi%0a/' http://127.0.0.1%0d%0aCookie%3a hi%0a/: Invalid host name. CC:
(none) =>
davidwhodgins
Dave Hodgins
2017-04-03 23:00:18 CEST
Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0104.html Status:
ASSIGNED =>
RESOLVED |