MGASA-2016-0323

Source
https://advisories.mageia.org/MGASA-2016-0323.html
Import Source
https://advisories.mageia.org/MGASA-2016-0323.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0323
Related
Published
2016-09-28T05:59:24Z
Modified
2016-09-28T05:49:58Z
Summary
Updated wget packages fix security vulnerability
Details

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource (CVE-2016-4971).

Fixed a potential race condition by creating files with .tmp ext and making them accessible to the current user only (CVE-2016-7098).

References
Credits

Affected packages

Mageia:5 / wget

Package

Name
wget
Purl
pkg:rpm/mageia/wget?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15-5.1.mga5

Ecosystem specific

{
    "section": "core"
}