Security Advisory Moderate: wget security and bug fix update

Advisory: RHSA-2016:2587-1
Type: Security Advisory
Severity: Moderate
Issued on: 2016-11-03
Last updated on: 2016-11-03
Affected Products: Red Hat Enterprise Linux Desktop (v. 7)
Red Hat Enterprise Linux HPC Node (v. 7)
Red Hat Enterprise Linux Server (v. 7)
Red Hat Enterprise Linux Workstation (v. 7)
CVEs (cve.mitre.org): CVE-2016-4971

Details

An update for wget is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS,
and FTP protocols.

Security Fix(es):

* It was found that wget used a file name provided by the server for the
downloaded file when following an HTTP redirect to a FTP server resource. This
could cause wget to create a file with a different name than expected, possibly
allowing the server to execute arbitrary code on the client. (CVE-2016-4971)

Red Hat would like to thank GNU wget project for reporting this issue. Upstream
acknowledges Dawid Golunski as the original reporter.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise
Linux 7.3 Release Notes linked from the References section.


Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
wget-1.14-13.el7.src.rpm     MD5: 1435a5da6af79f433104a69615a789aa
SHA-256: 01fd9ef9e36a691d3653dcf79d9447b55d700490e5923ec0a23961d680d50748
 
x86_64:
wget-1.14-13.el7.x86_64.rpm     MD5: f07187e88ea6bd4b62f973195d3d91e2
SHA-256: 6b9529a7121c223b042b25cb3201ea3da4469dfe57489d9e9bade7cb9bd11e79
wget-debuginfo-1.14-13.el7.x86_64.rpm     MD5: 58645ec42643bff14307f6663a2cda9c
SHA-256: 4d6ea095642b2a66b7df9c22d09cb26797fd8eeb8a9d27eb26a467ab62a8968b
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
wget-1.14-13.el7.src.rpm     MD5: 1435a5da6af79f433104a69615a789aa
SHA-256: 01fd9ef9e36a691d3653dcf79d9447b55d700490e5923ec0a23961d680d50748
 
x86_64:
wget-1.14-13.el7.x86_64.rpm     MD5: f07187e88ea6bd4b62f973195d3d91e2
SHA-256: 6b9529a7121c223b042b25cb3201ea3da4469dfe57489d9e9bade7cb9bd11e79
wget-debuginfo-1.14-13.el7.x86_64.rpm     MD5: 58645ec42643bff14307f6663a2cda9c
SHA-256: 4d6ea095642b2a66b7df9c22d09cb26797fd8eeb8a9d27eb26a467ab62a8968b
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
wget-1.14-13.el7.src.rpm     MD5: 1435a5da6af79f433104a69615a789aa
SHA-256: 01fd9ef9e36a691d3653dcf79d9447b55d700490e5923ec0a23961d680d50748
 
PPC:
wget-1.14-13.el7.ppc64.rpm     MD5: 6b7aee2b5c6275ccb912038e562bea6c
SHA-256: 4e53853246eabe44bb56ce96d39e27c0a9e22f56f1d78cabdfadff8c5e86648a
wget-debuginfo-1.14-13.el7.ppc64.rpm     MD5: 37d744a05c52182c963fa159e1414809
SHA-256: 4a164995d91e5017f1488a70991fddaa627f4a2ba0812fda6dc45622b021a7fa
 
PPC64LE:
wget-1.14-13.el7.ppc64le.rpm     MD5: 0a1a2a11407896172d7f695b867af2a1
SHA-256: 3b9e51bcbc166fd4ded2f9b61ae826a9d17c8e3c17461539090bb058be9eaa2b
wget-debuginfo-1.14-13.el7.ppc64le.rpm     MD5: 0a6167fedf831f96102772adad95bf8f
SHA-256: 9d4d97ef66dbef798d58fa2b96d813f7170038c7d7bcc78bda220c4f941a81fa
 
s390x:
wget-1.14-13.el7.s390x.rpm     MD5: 4bdb1b5d1e1c9561cb9f5457e66d40df
SHA-256: 2cd4f57bd2576dd5042fcf0714ccbc5aa221567a3936615a44607d888c749610
wget-debuginfo-1.14-13.el7.s390x.rpm     MD5: 6efaa5b1a508eeefe70dd948a1f220b8
SHA-256: 3d082f77d5d8d98b811e907b06524520ba69d3d82d08d3c107adea16ef78c0e6
 
x86_64:
wget-1.14-13.el7.x86_64.rpm     MD5: f07187e88ea6bd4b62f973195d3d91e2
SHA-256: 6b9529a7121c223b042b25cb3201ea3da4469dfe57489d9e9bade7cb9bd11e79
wget-debuginfo-1.14-13.el7.x86_64.rpm     MD5: 58645ec42643bff14307f6663a2cda9c
SHA-256: 4d6ea095642b2a66b7df9c22d09cb26797fd8eeb8a9d27eb26a467ab62a8968b
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
wget-1.14-13.el7.src.rpm     MD5: 1435a5da6af79f433104a69615a789aa
SHA-256: 01fd9ef9e36a691d3653dcf79d9447b55d700490e5923ec0a23961d680d50748
 
x86_64:
wget-1.14-13.el7.x86_64.rpm     MD5: f07187e88ea6bd4b62f973195d3d91e2
SHA-256: 6b9529a7121c223b042b25cb3201ea3da4469dfe57489d9e9bade7cb9bd11e79
wget-debuginfo-1.14-13.el7.x86_64.rpm     MD5: 58645ec42643bff14307f6663a2cda9c
SHA-256: 4d6ea095642b2a66b7df9c22d09cb26797fd8eeb8a9d27eb26a467ab62a8968b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1147572 - -nv documented as synonymous to both --no-verbose and --report-speed
1343666 - CVE-2016-4971 wget: Lack of filename checking allows arbitrary file upload via FTP redirect


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/