Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0494 (GCVE-0-2018-0494)
Vulnerability from cvelistv5
- cookie injection
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:10.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "name": "RHSA-2018:3052", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://savannah.gnu.org/bugs/?53763" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "name": "GLSA-201806-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201806-01" }, { "name": "DSA-4195", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4195" }, { "name": "104129", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104129" }, { "name": "1040838", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040838" }, { "name": "44601", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44601/" }, { "name": "USN-3643-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3643-2/" }, { "name": "[debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "name": "USN-3643-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3643-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WGet", "vendor": "n/a", "versions": [ { "status": "affected", "version": "WGet" } ] } ], "datePublic": "2018-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line." } ], "problemTypes": [ { "descriptions": [ { "description": "cookie injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-31T09:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "name": "RHSA-2018:3052", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "tags": [ "x_refsource_MISC" ], "url": "https://savannah.gnu.org/bugs/?53763" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "name": "GLSA-201806-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201806-01" }, { "name": "DSA-4195", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4195" }, { "name": "104129", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104129" }, { "name": "1040838", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040838" }, { "name": "44601", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44601/" }, { "name": "USN-3643-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3643-2/" }, { "name": "[debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "name": "USN-3643-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3643-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2018-0494", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WGet", "version": { "version_data": [ { "version_value": "WGet" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cookie injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt", "refsource": "MISC", "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "name": "RHSA-2018:3052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "name": "https://savannah.gnu.org/bugs/?53763", "refsource": "MISC", "url": "https://savannah.gnu.org/bugs/?53763" }, { "name": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd", "refsource": "MISC", "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "name": "GLSA-201806-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201806-01" }, { "name": "DSA-4195", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4195" }, { "name": "104129", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104129" }, { "name": "1040838", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040838" }, { "name": "44601", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44601/" }, { "name": "USN-3643-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3643-2/" }, { "name": "[debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "name": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html", "refsource": "MISC", "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "name": "USN-3643-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3643-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-0494", "datePublished": "2018-05-06T22:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-08-05T03:28:10.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-0494\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2018-05-06T22:29:00.217\",\"lastModified\":\"2024-11-21T03:38:21.017\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\\\r\\\\n sequence in a continuation line.\"},{\"lang\":\"es\",\"value\":\"GNU Wget en versiones anteriores a la 1.19.5 es propenso a una vulnerabilidad de inyecci\u00f3n de cookies en la funci\u00f3n resp_new en http.c mediante una secuencia \\\\r\\\\n en una l\u00ednea de continuaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.19.5\",\"matchCriteriaId\":\"4599B4B8-FD6C-4A9E-806D-2BFE5D8CC297\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104129\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040838\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3052\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html\",\"source\":\"security@debian.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://savannah.gnu.org/bugs/?53763\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://security.gentoo.org/glsa/201806-01\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3643-1/\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3643-2/\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4195\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44601/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/104129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://savannah.gnu.org/bugs/?53763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://security.gentoo.org/glsa/201806-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3643-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3643-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44601/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
rhsa-2018:3052
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar (CVE-2018-0494)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3052", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "category": "external", "summary": "1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3052.json" } ], "title": "Red Hat Security Advisory: wget security and bug fix update", "tracking": { "current_release_date": "2025-09-10T14:24:19+00:00", "generator": { "date": "2025-09-10T14:24:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:3052", "initial_release_date": "2018-10-30T09:42:57+00:00", "revision_history": [ { "date": "2018-10-30T09:42:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-30T09:42:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:24:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.x86_64", "product": { "name": "wget-0:1.14-18.el7.x86_64", "product_id": "wget-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_id": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.src", "product": { "name": "wget-0:1.14-18.el7.src", "product_id": "wget-0:1.14-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.s390x", "product": { "name": "wget-0:1.14-18.el7.s390x", "product_id": "wget-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product": { "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product_id": "wget-debuginfo-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64", "product": { "name": "wget-0:1.14-18.el7.ppc64", "product_id": "wget-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64le", "product": { "name": "wget-0:1.14-18.el7.ppc64le", "product_id": "wget-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.aarch64", "product": { "name": "wget-0:1.14-18.el7.aarch64", "product_id": "wget-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_id": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0494", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575634" } ], "notes": [ { "category": "description", "text": "A cookie injection flaw was found in wget. An attacker can create a malicious website which, when accessed, overrides cookies belonging to arbitrary domains.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "RHBZ#1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0494", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494" } ], "release_date": "2018-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T09:42:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar" } ] }
RHSA-2018:3052
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar (CVE-2018-0494)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3052", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "category": "external", "summary": "1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3052.json" } ], "title": "Red Hat Security Advisory: wget security and bug fix update", "tracking": { "current_release_date": "2025-09-10T14:24:19+00:00", "generator": { "date": "2025-09-10T14:24:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2018:3052", "initial_release_date": "2018-10-30T09:42:57+00:00", "revision_history": [ { "date": "2018-10-30T09:42:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-30T09:42:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T14:24:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.x86_64", "product": { "name": "wget-0:1.14-18.el7.x86_64", "product_id": "wget-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_id": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.src", "product": { "name": "wget-0:1.14-18.el7.src", "product_id": "wget-0:1.14-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.s390x", "product": { "name": "wget-0:1.14-18.el7.s390x", "product_id": "wget-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product": { "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product_id": "wget-debuginfo-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64", "product": { "name": "wget-0:1.14-18.el7.ppc64", "product_id": "wget-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64le", "product": { "name": "wget-0:1.14-18.el7.ppc64le", "product_id": "wget-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.aarch64", "product": { "name": "wget-0:1.14-18.el7.aarch64", "product_id": "wget-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_id": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0494", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575634" } ], "notes": [ { "category": "description", "text": "A cookie injection flaw was found in wget. An attacker can create a malicious website which, when accessed, overrides cookies belonging to arbitrary domains.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "RHBZ#1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0494", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494" } ], "release_date": "2018-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T09:42:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar" } ] }
rhsa-2018_3052
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wget is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols.\n\nSecurity Fix(es):\n\n* wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar (CVE-2018-0494)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3052", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "category": "external", "summary": "1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3052.json" } ], "title": "Red Hat Security Advisory: wget security and bug fix update", "tracking": { "current_release_date": "2024-11-22T11:53:13+00:00", "generator": { "date": "2024-11-22T11:53:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:3052", "initial_release_date": "2018-10-30T09:42:57+00:00", "revision_history": [ { "date": "2018-10-30T09:42:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-10-30T09:42:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:53:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.x86_64", "product": { "name": "wget-0:1.14-18.el7.x86_64", "product_id": "wget-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_id": "wget-debuginfo-0:1.14-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.src", "product": { "name": "wget-0:1.14-18.el7.src", "product_id": "wget-0:1.14-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.s390x", "product": { "name": "wget-0:1.14-18.el7.s390x", "product_id": "wget-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product": { "name": "wget-debuginfo-0:1.14-18.el7.s390x", "product_id": "wget-debuginfo-0:1.14-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64", "product": { "name": "wget-0:1.14-18.el7.ppc64", "product_id": "wget-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.ppc64le", "product": { "name": "wget-0:1.14-18.el7.ppc64le", "product_id": "wget-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_id": "wget-debuginfo-0:1.14-18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-0:1.14-18.el7.aarch64", "product": { "name": "wget-0:1.14-18.el7.aarch64", "product_id": "wget-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget@1.14-18.el7?arch=aarch64" } } }, { "category": "product_version", "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_id": "wget-debuginfo-0:1.14-18.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wget-debuginfo@1.14-18.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Client-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.aarch64" }, "product_reference": "wget-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64" }, "product_reference": "wget-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.s390x" }, "product_reference": "wget-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.src" }, "product_reference": "wget-0:1.14-18.el7.src", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-0:1.14-18.el7.x86_64" }, "product_reference": "wget-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.aarch64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.s390x", "relates_to_product_reference": "7Workstation-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "wget-debuginfo-0:1.14-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" }, "product_reference": "wget-debuginfo-0:1.14-18.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0494", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575634" } ], "notes": [ { "category": "description", "text": "A cookie injection flaw was found in wget. An attacker can create a malicious website which, when accessed, overrides cookies belonging to arbitrary domains.", "title": "Vulnerability description" }, { "category": "summary", "text": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "RHBZ#1575634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0494", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0494" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494" } ], "release_date": "2018-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-10-30T09:42:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "7Client-7.6:wget-0:1.14-18.el7.aarch64", "7Client-7.6:wget-0:1.14-18.el7.ppc64", "7Client-7.6:wget-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-0:1.14-18.el7.s390x", "7Client-7.6:wget-0:1.14-18.el7.src", "7Client-7.6:wget-0:1.14-18.el7.x86_64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Client-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-0:1.14-18.el7.src", "7ComputeNode-7.6:wget-0:1.14-18.el7.x86_64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7ComputeNode-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-7.6:wget-0:1.14-18.el7.aarch64", "7Server-7.6:wget-0:1.14-18.el7.ppc64", "7Server-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-0:1.14-18.el7.s390x", "7Server-7.6:wget-0:1.14-18.el7.src", "7Server-7.6:wget-0:1.14-18.el7.x86_64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-0:1.14-18.el7.src", "7Server-Alt-7.6:wget-0:1.14-18.el7.x86_64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Server-Alt-7.6:wget-debuginfo-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-0:1.14-18.el7.src", "7Workstation-7.6:wget-0:1.14-18.el7.x86_64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.aarch64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.ppc64le", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.s390x", "7Workstation-7.6:wget-debuginfo-0:1.14-18.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar" } ] }
suse-su-2018:1367-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2018-0494: Fixed Cookie injection vulnerability by checking for\n and joining continuation lines. (bsc#1092061)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "secsp3-wget-13619,slessp4-wget-13619", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1367-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1367-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181367-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1367-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004071.html" }, { "category": "self", "summary": "SUSE Bug 1092061", "url": "https://bugzilla.suse.com/1092061" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0494 page", "url": "https://www.suse.com/security/cve/CVE-2018-0494/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2018-05-22T18:01:16Z", "generator": { "date": "2018-05-22T18:01:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1367-1", "initial_release_date": "2018-05-22T18:01:16Z", "revision_history": [ { "date": "2018-05-22T18:01:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-openssl1-1.11.4-1.41.3.1.i586", "product": { "name": "wget-openssl1-1.11.4-1.41.3.1.i586", "product_id": "wget-openssl1-1.11.4-1.41.3.1.i586" } }, { "category": "product_version", "name": "wget-1.11.4-1.41.3.1.i586", "product": { "name": "wget-1.11.4-1.41.3.1.i586", "product_id": "wget-1.11.4-1.41.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "wget-openssl1-1.11.4-1.41.3.1.ia64", "product": { "name": "wget-openssl1-1.11.4-1.41.3.1.ia64", "product_id": "wget-openssl1-1.11.4-1.41.3.1.ia64" } }, { "category": "product_version", "name": "wget-1.11.4-1.41.3.1.ia64", "product": { "name": "wget-1.11.4-1.41.3.1.ia64", "product_id": "wget-1.11.4-1.41.3.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "wget-openssl1-1.11.4-1.41.3.1.ppc64", "product": { "name": "wget-openssl1-1.11.4-1.41.3.1.ppc64", "product_id": "wget-openssl1-1.11.4-1.41.3.1.ppc64" } }, { "category": "product_version", "name": "wget-1.11.4-1.41.3.1.ppc64", "product": { "name": "wget-1.11.4-1.41.3.1.ppc64", "product_id": "wget-1.11.4-1.41.3.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "wget-openssl1-1.11.4-1.41.3.1.s390x", "product": { "name": "wget-openssl1-1.11.4-1.41.3.1.s390x", "product_id": "wget-openssl1-1.11.4-1.41.3.1.s390x" } }, { "category": "product_version", "name": "wget-1.11.4-1.41.3.1.s390x", "product": { "name": "wget-1.11.4-1.41.3.1.s390x", "product_id": "wget-1.11.4-1.41.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-openssl1-1.11.4-1.41.3.1.x86_64", "product": { "name": "wget-openssl1-1.11.4-1.41.3.1.x86_64", "product_id": "wget-openssl1-1.11.4-1.41.3.1.x86_64" } }, { "category": "product_version", "name": "wget-1.11.4-1.41.3.1.x86_64", "product": { "name": "wget-1.11.4-1.41.3.1.x86_64", "product_id": "wget-1.11.4-1.41.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11-SECURITY", "product": { "name": "SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:security" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-openssl1-1.11.4-1.41.3.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.i586" }, "product_reference": "wget-openssl1-1.11.4-1.41.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "wget-openssl1-1.11.4-1.41.3.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ia64" }, "product_reference": "wget-openssl1-1.11.4-1.41.3.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "wget-openssl1-1.11.4-1.41.3.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ppc64" }, "product_reference": "wget-openssl1-1.11.4-1.41.3.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "wget-openssl1-1.11.4-1.41.3.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.s390x" }, "product_reference": "wget-openssl1-1.11.4-1.41.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "wget-openssl1-1.11.4-1.41.3.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.x86_64" }, "product_reference": "wget-openssl1-1.11.4-1.41.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.i586" }, "product_reference": "wget-1.11.4-1.41.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ia64" }, "product_reference": "wget-1.11.4-1.41.3.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ppc64" }, "product_reference": "wget-1.11.4-1.41.3.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.s390x" }, "product_reference": "wget-1.11.4-1.41.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.x86_64" }, "product_reference": "wget-1.11.4-1.41.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.i586" }, "product_reference": "wget-1.11.4-1.41.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ia64" }, "product_reference": "wget-1.11.4-1.41.3.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ppc64" }, "product_reference": "wget-1.11.4-1.41.3.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.s390x" }, "product_reference": "wget-1.11.4-1.41.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.11.4-1.41.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.x86_64" }, "product_reference": "wget-1.11.4-1.41.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0494" } ], "notes": [ { "category": "general", "text": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0494", "url": "https://www.suse.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "SUSE Bug 1092061 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1092061" }, { "category": "external", "summary": "SUSE Bug 1123797 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1123797" }, { "category": "external", "summary": "SUSE Bug 1159418 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1159418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11 SP4:wget-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:wget-openssl1-1.11.4-1.41.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:wget-1.11.4-1.41.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T18:01:16Z", "details": "moderate" } ], "title": "CVE-2018-0494" } ] }
suse-su-2018:1373-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for wget", "title": "Title of the patch" }, { "category": "description", "text": "This update for wget fixes the following issues:\n\n- CVE-2018-0494: Fixed a cookie injection vulnerability by checking for\n and joining continuation lines. (bsc#1092061)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-957,SUSE-SLE-SERVER-12-SP3-2018-957", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1373-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1373-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181373-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1373-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004075.html" }, { "category": "self", "summary": "SUSE Bug 1092061", "url": "https://bugzilla.suse.com/1092061" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0494 page", "url": "https://www.suse.com/security/cve/CVE-2018-0494/" } ], "title": "Security update for wget", "tracking": { "current_release_date": "2018-05-22T13:14:12Z", "generator": { "date": "2018-05-22T13:14:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1373-1", "initial_release_date": "2018-05-22T13:14:12Z", "revision_history": [ { "date": "2018-05-22T13:14:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.14-21.7.1.aarch64", "product": { "name": "wget-1.14-21.7.1.aarch64", "product_id": "wget-1.14-21.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.7.1.ppc64le", "product": { "name": "wget-1.14-21.7.1.ppc64le", "product_id": "wget-1.14-21.7.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.7.1.s390x", "product": { "name": "wget-1.14-21.7.1.s390x", "product_id": "wget-1.14-21.7.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.14-21.7.1.x86_64", "product": { "name": "wget-1.14-21.7.1.x86_64", "product_id": "wget-1.14-21.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:wget-1.14-21.7.1.x86_64" }, "product_reference": "wget-1.14-21.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.aarch64" }, "product_reference": "wget-1.14-21.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.ppc64le" }, "product_reference": "wget-1.14-21.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.s390x" }, "product_reference": "wget-1.14-21.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.x86_64" }, "product_reference": "wget-1.14-21.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.aarch64" }, "product_reference": "wget-1.14-21.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.ppc64le" }, "product_reference": "wget-1.14-21.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.s390x" }, "product_reference": "wget-1.14-21.7.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.14-21.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.x86_64" }, "product_reference": "wget-1.14-21.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0494" } ], "notes": [ { "category": "general", "text": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0494", "url": "https://www.suse.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "SUSE Bug 1092061 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1092061" }, { "category": "external", "summary": "SUSE Bug 1123797 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1123797" }, { "category": "external", "summary": "SUSE Bug 1159418 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1159418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server 12 SP3:wget-1.14-21.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:wget-1.14-21.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T13:14:12Z", "details": "moderate" } ], "title": "CVE-2018-0494" } ] }
gsd-2018-0494
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-0494", "description": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "id": "GSD-2018-0494", "references": [ "https://www.suse.com/security/cve/CVE-2018-0494.html", "https://www.debian.org/security/2018/dsa-4195", "https://access.redhat.com/errata/RHSA-2018:3052", "https://ubuntu.com/security/CVE-2018-0494", "https://advisories.mageia.org/CVE-2018-0494.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-0494.html", "https://linux.oracle.com/cve/CVE-2018-0494.html", "https://packetstormsecurity.com/files/cve/CVE-2018-0494" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-0494" ], "details": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "id": "GSD-2018-0494", "modified": "2023-12-13T01:22:24.873494Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2018-0494", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WGet", "version": { "version_data": [ { "version_value": "WGet" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cookie injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt", "refsource": "MISC", "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "name": "RHSA-2018:3052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "name": "https://savannah.gnu.org/bugs/?53763", "refsource": "MISC", "url": "https://savannah.gnu.org/bugs/?53763" }, { "name": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd", "refsource": "MISC", "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "name": "GLSA-201806-01", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201806-01" }, { "name": "DSA-4195", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4195" }, { "name": "104129", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104129" }, { "name": "1040838", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040838" }, { "name": "44601", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44601/" }, { "name": "USN-3643-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3643-2/" }, { "name": "[debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "name": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html", "refsource": "MISC", "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "name": "USN-3643-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3643-1/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.19.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2018-0494" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://savannah.gnu.org/bugs/?53763", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "https://savannah.gnu.org/bugs/?53763" }, { "name": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "name": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "name": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "name": "1040838", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040838" }, { "name": "44601", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44601/" }, { "name": "DSA-4195", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4195" }, { "name": "USN-3643-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-2/" }, { "name": "USN-3643-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-1/" }, { "name": "104129", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104129" }, { "name": "[debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "name": "GLSA-201806-01", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201806-01" }, { "name": "RHSA-2018:3052", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3052" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-03-15T01:22Z", "publishedDate": "2018-05-06T22:29Z" } } }
fkie_cve-2018-0494
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
gnu | wget | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*", "matchCriteriaId": "4599B4B8-FD6C-4A9E-806D-2BFE5D8CC297", "versionEndExcluding": "1.19.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line." }, { "lang": "es", "value": "GNU Wget en versiones anteriores a la 1.19.5 es propenso a una vulnerabilidad de inyecci\u00f3n de cookies en la funci\u00f3n resp_new en http.c mediante una secuencia \\r\\n en una l\u00ednea de continuaci\u00f3n." } ], "id": "CVE-2018-0494", "lastModified": "2024-11-21T03:38:21.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-06T22:29:00.217", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104129" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040838" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "source": "security@debian.org", "tags": [ "Broken Link" ], "url": "https://savannah.gnu.org/bugs/?53763" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201806-01" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-1/" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-2/" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4195" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44601/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://savannah.gnu.org/bugs/?53763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201806-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3643-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44601/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2018-09367
Vulnerability from cnvd
Title: GNU Wget cookie注入漏洞
Description:
GNU Wget是一个用于使用最广泛使用的Internet协议(HTTP、HTTPS、FTP及FTPS)检索文件的自由软件包。
1.19.5之前的GNU Wget中的http.c中的resp_new函数存在cookie注入漏洞。攻击者可通过连续行中的rn序列利用该漏洞进行cookie注入。
Severity: 中
Patch Name: GNU Wget cookie注入漏洞的补丁
Patch Description:
GNU Wget是一个用于使用最广泛使用的Internet协议(HTTP、HTTPS、FTP及FTPS)检索文件的自由软件包。
1.19.5之前的GNU Wget中的http.c中的resp_new函数存在cookie注入漏洞。攻击者可通过连续行中的rn序列利用该漏洞进行cookie注入。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布漏洞修复程序,请及时关注更新: https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
Reference: https://nvd.nist.gov/vuln/detail/CVE-2018-0494 http://www.securityfocus.com/bid/104129 https://www.exploit-db.com/exploits/44601/
Name | Gnu wget <=1.19.5 |
---|
{ "bids": { "bid": { "bidNumber": "104129" } }, "cves": { "cve": { "cveNumber": "CVE-2018-0494" } }, "description": "GNU Wget\u662f\u4e00\u4e2a\u7528\u4e8e\u4f7f\u7528\u6700\u5e7f\u6cdb\u4f7f\u7528\u7684Internet\u534f\u8bae\uff08HTTP\u3001HTTPS\u3001FTP\u53caFTPS\uff09\u68c0\u7d22\u6587\u4ef6\u7684\u81ea\u7531\u8f6f\u4ef6\u5305\u3002\r\n\r\n1.19.5\u4e4b\u524d\u7684GNU Wget\u4e2d\u7684http.c\u4e2d\u7684resp_new\u51fd\u6570\u5b58\u5728cookie\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u7eed\u884c\u4e2d\u7684rn\u5e8f\u5217\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884ccookie\u6ce8\u5165\u3002", "discovererName": "Harry Sintonen", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-09367", "openTime": "2018-05-14", "patchDescription": "GNU Wget\u662f\u4e00\u4e2a\u7528\u4e8e\u4f7f\u7528\u6700\u5e7f\u6cdb\u4f7f\u7528\u7684Internet\u534f\u8bae\uff08HTTP\u3001HTTPS\u3001FTP\u53caFTPS\uff09\u68c0\u7d22\u6587\u4ef6\u7684\u81ea\u7531\u8f6f\u4ef6\u5305\u3002\r\n\r\n1.19.5\u4e4b\u524d\u7684GNU Wget\u4e2d\u7684http.c\u4e2d\u7684resp_new\u51fd\u6570\u5b58\u5728cookie\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u7eed\u884c\u4e2d\u7684rn\u5e8f\u5217\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884ccookie\u6ce8\u5165\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "GNU Wget cookie\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Gnu wget \u003c=1.19.5" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494\r\nhttp://www.securityfocus.com/bid/104129\r\nhttps://www.exploit-db.com/exploits/44601/", "serverity": "\u4e2d", "submitTime": "2018-05-07", "title": "GNU Wget cookie\u6ce8\u5165\u6f0f\u6d1e" }
ghsa-7cw3-q27m-9w5f
Vulnerability from github
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
{ "affected": [], "aliases": [ "CVE-2018-0494" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-06T22:29:00Z", "severity": "MODERATE" }, "details": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "id": "GHSA-7cw3-q27m-9w5f", "modified": "2022-05-14T01:20:23Z", "published": "2022-05-14T01:20:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0494" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3052" }, { "type": "WEB", "url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html" }, { "type": "WEB", "url": "https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html" }, { "type": "WEB", "url": "https://savannah.gnu.org/bugs/?53763" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201806-01" }, { "type": "WEB", "url": "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3643-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3643-2" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4195" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/44601" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104129" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040838" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
opensuse-su-2024:11510-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "wget-1.21.1-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the wget-1.21.1-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11510", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11510-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-6719 page", "url": "https://www.suse.com/security/cve/CVE-2006-6719/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13089 page", "url": "https://www.suse.com/security/cve/CVE-2017-13089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13090 page", "url": "https://www.suse.com/security/cve/CVE-2017-13090/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6508 page", "url": "https://www.suse.com/security/cve/CVE-2017-6508/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0494 page", "url": "https://www.suse.com/security/cve/CVE-2018-0494/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20483 page", "url": "https://www.suse.com/security/cve/CVE-2018-20483/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5953 page", "url": "https://www.suse.com/security/cve/CVE-2019-5953/" } ], "title": "wget-1.21.1-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11510-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wget-1.21.1-2.2.aarch64", "product": { "name": "wget-1.21.1-2.2.aarch64", "product_id": "wget-1.21.1-2.2.aarch64" } }, { "category": "product_version", "name": "wget-lang-1.21.1-2.2.aarch64", "product": { "name": "wget-lang-1.21.1-2.2.aarch64", "product_id": "wget-lang-1.21.1-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wget-1.21.1-2.2.ppc64le", "product": { "name": "wget-1.21.1-2.2.ppc64le", "product_id": "wget-1.21.1-2.2.ppc64le" } }, { "category": "product_version", "name": "wget-lang-1.21.1-2.2.ppc64le", "product": { "name": "wget-lang-1.21.1-2.2.ppc64le", "product_id": "wget-lang-1.21.1-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wget-1.21.1-2.2.s390x", "product": { "name": "wget-1.21.1-2.2.s390x", "product_id": "wget-1.21.1-2.2.s390x" } }, { "category": "product_version", "name": "wget-lang-1.21.1-2.2.s390x", "product": { "name": "wget-lang-1.21.1-2.2.s390x", "product_id": "wget-lang-1.21.1-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wget-1.21.1-2.2.x86_64", "product": { "name": "wget-1.21.1-2.2.x86_64", "product_id": "wget-1.21.1-2.2.x86_64" } }, { "category": "product_version", "name": "wget-lang-1.21.1-2.2.x86_64", "product": { "name": "wget-lang-1.21.1-2.2.x86_64", "product_id": "wget-lang-1.21.1-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wget-1.21.1-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64" }, "product_reference": "wget-1.21.1-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.21.1-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le" }, "product_reference": "wget-1.21.1-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.21.1-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x" }, "product_reference": "wget-1.21.1-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-1.21.1-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64" }, "product_reference": "wget-1.21.1-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.21.1-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64" }, "product_reference": "wget-lang-1.21.1-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.21.1-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le" }, "product_reference": "wget-lang-1.21.1-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.21.1-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x" }, "product_reference": "wget-lang-1.21.1-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wget-lang-1.21.1-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" }, "product_reference": "wget-lang-1.21.1-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-6719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-6719" } ], "notes": [ { "category": "general", "text": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-6719", "url": "https://www.suse.com/security/cve/CVE-2006-6719" }, { "category": "external", "summary": "SUSE Bug 231063 for CVE-2006-6719", "url": "https://bugzilla.suse.com/231063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-6719" }, { "cve": "CVE-2017-13089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13089" } ], "notes": [ { "category": "general", "text": "The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk\u0027s length, but doesn\u0027t check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13089", "url": "https://www.suse.com/security/cve/CVE-2017-13089" }, { "category": "external", "summary": "SUSE Bug 1064715 for CVE-2017-13089", "url": "https://bugzilla.suse.com/1064715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13089" }, { "cve": "CVE-2017-13090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13090" } ], "notes": [ { "category": "general", "text": "The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk\u0027s length, but doesn\u0027t check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13090", "url": "https://www.suse.com/security/cve/CVE-2017-13090" }, { "category": "external", "summary": "SUSE Bug 1064716 for CVE-2017-13090", "url": "https://bugzilla.suse.com/1064716" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-13090" }, { "cve": "CVE-2017-6508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6508" } ], "notes": [ { "category": "general", "text": "CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6508", "url": "https://www.suse.com/security/cve/CVE-2017-6508" }, { "category": "external", "summary": "SUSE Bug 1028301 for CVE-2017-6508", "url": "https://bugzilla.suse.com/1028301" }, { "category": "external", "summary": "SUSE Bug 1159418 for CVE-2017-6508", "url": "https://bugzilla.suse.com/1159418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-6508" }, { "cve": "CVE-2018-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0494" } ], "notes": [ { "category": "general", "text": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0494", "url": "https://www.suse.com/security/cve/CVE-2018-0494" }, { "category": "external", "summary": "SUSE Bug 1092061 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1092061" }, { "category": "external", "summary": "SUSE Bug 1123797 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1123797" }, { "category": "external", "summary": "SUSE Bug 1159418 for CVE-2018-0494", "url": "https://bugzilla.suse.com/1159418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-0494" }, { "cve": "CVE-2018-20483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20483" } ], "notes": [ { "category": "general", "text": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20483", "url": "https://www.suse.com/security/cve/CVE-2018-20483" }, { "category": "external", "summary": "SUSE Bug 1120382 for CVE-2018-20483", "url": "https://bugzilla.suse.com/1120382" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-20483" }, { "cve": "CVE-2019-5953", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5953" } ], "notes": [ { "category": "general", "text": "Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5953", "url": "https://www.suse.com/security/cve/CVE-2019-5953" }, { "category": "external", "summary": "SUSE Bug 1131493 for CVE-2019-5953", "url": "https://bugzilla.suse.com/1131493" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x", "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-5953" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.