Skip to navigation

Bug Fix Advisory wget bug fix update

Advisory: RHBA-2012:0560-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-10
Last updated on: 2012-05-10
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated wget packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

GNU Wget is a file retrieval utility which can use either the HTTP, HTTPS or FTP
protocol. Wget provides various useful features, such as the ability to work in
the background while the user is logged out, recursive retrieval of directories,
file name wildcard matching or updating files in dependency on file timestamp
comparison.

This update fixes the following bug:

* The wget utility did not previously work as intended with the "-T, --timeout"
option set. As a consequence, if the HTTPS server accepted a wget session but
did not respond to the SSL handshake, the timeout could not take effect and Wget
did not terminate the session after a given time. With this update, the
underlying source code has been modified to ensure that Wget aborts the
connection in this scenario. (BZ#815418)

All users of wget are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
wget-1.11.4-3.el5_8.2.src.rpm     MD5: 6997e360d9ea77c6804089352c0d2d54
SHA-256: 31956275339ac1dfc59602c3f73356fa80957dc5e4c45a6b848453843c382e99
 
IA-32:
wget-1.11.4-3.el5_8.2.i386.rpm     MD5: b65fb15a1f4914506db93dba73a05773
SHA-256: 91020d4304f3ef4c0760fb7516e7f225eee82cbe1217970d6a7101ce6d90480d
 
IA-64:
wget-1.11.4-3.el5_8.2.ia64.rpm     MD5: 1b5fd32a3f501b63655836ad35d42dc7
SHA-256: 36d19a0d35f970aa65eb1669a4f3d46c7f5a4a862caf69405442b627137c738c
 
PPC:
wget-1.11.4-3.el5_8.2.ppc.rpm     MD5: 6ee4d0918a9123783261a0d97ae2cc96
SHA-256: 090935a741e44529e90bdf8750dafdc80a6057ba03e8d284d1cd15f58271a96a
 
s390x:
wget-1.11.4-3.el5_8.2.s390x.rpm     MD5: 81354546d536ac53c750bb1f2134038e
SHA-256: cdb062de9bdc4f6ad3597327ee7e93cfc0a0fb6f6ebc1f46157782f8234d4bb1
 
x86_64:
wget-1.11.4-3.el5_8.2.x86_64.rpm     MD5: 49eb3438f66e11583fb653675f9a9209
SHA-256: 8e7bcb3c5f3d0b1d7662c730448576605c8762e5a9e070573450cfef9cb136b8
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
wget-1.11.4-3.el5_8.2.src.rpm     MD5: 6997e360d9ea77c6804089352c0d2d54
SHA-256: 31956275339ac1dfc59602c3f73356fa80957dc5e4c45a6b848453843c382e99
 
IA-32:
wget-1.11.4-3.el5_8.2.i386.rpm     MD5: b65fb15a1f4914506db93dba73a05773
SHA-256: 91020d4304f3ef4c0760fb7516e7f225eee82cbe1217970d6a7101ce6d90480d
 
x86_64:
wget-1.11.4-3.el5_8.2.x86_64.rpm     MD5: 49eb3438f66e11583fb653675f9a9209
SHA-256: 8e7bcb3c5f3d0b1d7662c730448576605c8762e5a9e070573450cfef9cb136b8
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/