Commit Graph

20 Commits

Author SHA1 Message Date
Matthias Fischer
49deea707b wget: Update to 1.20.1
This is a bugfix release:

"due to some privacy issues in default settings of Wget, we introduce
this bugfix release.

The --xattr option (saving original URL and Referer into extended file
attributes) was introduced and enabled by default since Wget 1.19.
It possibly saved - possibly unrecognized by the user - credentials,
access tokes etc that were included in the requested URL.

We changed three details as a countermeasure, see below in the NEWS section.

With Best Regards, Tim

...

NEWS

* Changes in Wget 1.20.1

** --xattr is no longer default since it introduces privacy issues.

** --xattr saves the Referer as scheme/host/port,
user/pw/path/query/fragment
   are no longer saved to prevent privacy issues.

   ** --xattr saves the Original URL without user/password to prevent
      privacy issues."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-31 00:35:50 +00:00
Michael Tremer
de4f303186 core127: Ship updated unbound
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-11 19:46:10 +00:00
Matthias Fischer
c2e008880c wget: Update to 1.19.5
Hi,

Excerpts from official announcement:

"This version fixes CVE-2018-0494 (Cookie injection vulnerability) found
by Harry Sintonen.
This version fixes several issues, mostly found by OSS-Fuzz.
It also introduces TLS1.3 with OpenSSL, a new option --ciphers and
updates the CSS grammar to version 2.2.
...
Noteworthy changes:

* Fix cookie injection (CVE-2018-0494)
* Enable TLS1.3 with recent OpenSSL environment
* New option --ciphers to set GnuTLS / OpenSSL ciphers directly
* Updated CSS grammar to CSS 2.2
* Fixed several memleaks found by OSS-Fuzz
* Fixed several buffer overflows found by OSS-Fuzz
* Fixed several integer overflows found by OSS-Fuzz
* Several minor bug fixes"

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-05-07 11:34:24 +01:00
Michael Tremer
c2646dff80 Revert "wget: Link against GnuTLS instead of OpenSSL"
This reverts commit a46b159a8d.

wget 1.19.4 supports linking against OpenSSL 1.1.0.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-21 12:55:36 +00:00
Michael Tremer
a46b159a8d wget: Link against GnuTLS instead of OpenSSL
This version does not seem to be compatible with OpenSSL 1.1
and might be changed back to OpenSSL when ever it will compile.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-11 22:19:45 +00:00
Matthias Fischer
c5845b096d wget: Update to 1.9.4
Excerpts from changelog (Details => http://git.savannah.gnu.org/cgit/wget.git):

"Switch off compression by default

	Gzip compression has a number of bugs which need to be ironed out before we can support it
	by default. Some of these stem from a misunderstanding of the HTTP spec, but a lot of them
	are also due to many web servers not
	being compliant with RFC 7231.

	With this commit, I am marking GZip compression support as experimental
	in GNU Wget pending further investigation and the addition of tests.

	* src/http.c (gethttp): Fix bug that prevented all files from being decompressed

	* src/host.c (sufmatch): Fix to domain matching

	Replace HTTP urls with HTTPS where valid

	Avoid redirecting output to file when tcgetpgrp fails
	* src/log.c (check_redirect_output): tcgetpgrp can return -1 (ENOTTY),
	be sure to check whether a valid controlling terminal exists before
	redirecting. (Fixes: #51181)

	Fix heap overflow in HTTP protocol handling (CVE-2017-13090)

	Fix stack overflow in HTTP protocol handling (CVE-2017-13089)"

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-01-24 16:06:53 +00:00
Michael Tremer
770c2c5222 wget: Update file extension
Upstream does not distribute XZ compressed tarballs any more

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-11-02 15:38:11 +00:00
Michael Tremer
a016c0ce6a wget: Update to 1.19.2
Fixes CVE-2017-13089

A stack-based buffer overflow when processing chunked, encoded HTTP
responses was found in wget. By tricking an unsuspecting user into
connecting to a malicious HTTP server, an attacker could exploit
this flaw to potentially execute arbitrary code.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-29 18:33:03 +00:00
Matthias Fischer
ef784313d1 wget: Update to 1.19.1
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-02-15 09:29:18 +00:00
Matthias Fischer
6c31e0993c wget: Update to 1.19
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-02-03 18:08:57 +00:00
Matthias Fischer
e072f094e6 wget: Update to 1.18
Excerpt from annoncement:

"This version fixes a security vulnerability (CVE-2016-4971) present in
all old versions of wget.  The vulnerability was discovered by Dawid
Golunski which were reported to us by Beyond Security's SecuriTeam.

On a server redirect from HTTP to a FTP resource, wget would trust the
HTTP server and uses the name in the redirected URL as the destination
filename.
This behaviour was changed and now it works similarly as a redirect from
HTTP to another HTTP resource so the original name is used as
the destination file.  To keep the previous behaviour the user must
provide --trust-server-names."

Best,
Mat-backfromholidays-thias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-06-16 09:26:35 +01:00
Matthias Fischer
6118218c19 wget: Update to 1.17.1
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-06-16 09:26:31 +01:00
Matthias Fischer
9d1da799fa wget: Update to 1.16 2014-11-06 23:53:01 +01:00
Erik Kapfer
55e16317fd wget: Update to 1.14. 2013-12-26 14:03:31 +01:00
Michael Tremer
b7d60471a2 Remove tons of old uClibc/installer system related stuff. 2012-08-11 18:13:23 -04:00
ms
70df830214 Ein Paar Dateien fuer die GPLv3 angepasst.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@853 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-08-29 13:25:32 +00:00
ms
c78a77ebeb Alten PCMCIA Code aus dem Installer entfernt.
Unattended Installation bearbeitet.
HTTP/FTP-Installation nun moeglich.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@449 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2007-03-17 21:14:34 +00:00
ms
fd3e7da032 Zwischencommit fuer LFS.
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@324 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-10-15 20:25:07 +00:00
ms
7a98bae5d3 Quellenupdate:
* tcpdump/glibc/wget/libpng/vlan/expect/vim
Programmupdate:
  * libpng 1.2.8 --> 1.2.12
  * dnsmasq 2.22 --> 2.33
Geandert:
  * Packager fuer Pakfire angepasst. (Namen mit Unterstrich)
  * Squid mit 2 Patches versehen.
  * Konsolentyp: xterm-color
Hinzugefuegt:
  * Subversion 1.3.1
  * IPTraf 3.0.0


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@250 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-08-19 11:04:41 +00:00
ms
1fe6c87bf3 Update Squid to 2.5STABLE13.
Added WGET/HDDTEMP/BRIDGE-UTILS.
SCSI-GRUB-Konfiguration angepasst.



git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@85 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-03-26 18:46:32 +00:00