Matthias Fischer e072f094e6 wget: Update to 1.18
Excerpt from annoncement:

"This version fixes a security vulnerability (CVE-2016-4971) present in
all old versions of wget.  The vulnerability was discovered by Dawid
Golunski which were reported to us by Beyond Security's SecuriTeam.

On a server redirect from HTTP to a FTP resource, wget would trust the
HTTP server and uses the name in the redirected URL as the destination
filename.
This behaviour was changed and now it works similarly as a redirect from
HTTP to another HTTP resource so the original name is used as
the destination file.  To keep the previous behaviour the user must
provide --trust-server-names."

Best,
Mat-backfromholidays-thias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-06-16 09:26:35 +01:00
2016-06-16 09:24:22 +01:00
2016-01-22 00:55:46 +00:00
2016-06-01 22:48:28 +01:00
2016-06-16 09:26:35 +01:00
2016-06-01 22:43:47 +01:00
2016-06-01 22:17:10 +01:00
2010-01-22 11:37:55 +01:00
2016-06-16 09:24:22 +01:00
Description
No description provided
101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%