- ------------------------------------------------------------------------- Debian Security Advisory DSA-4195-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 08, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wget CVE ID : CVE-2018-0494 Debian Bug : 898076 Harry Sintonen discovered that wget, a network utility to retrieve files from the web, does not properly handle '\r\n' from continuation lines while parsing the Set-Cookie HTTP header. A malicious web server could use this flaw to inject arbitrary cookies to the cookie jar file, adding new or replacing existing cookie values. For the oldstable distribution (jessie), this problem has been fixed in version 1.16-1+deb8u5. For the stable distribution (stretch), this problem has been fixed in version 1.18-5+deb9u2. We recommend that you upgrade your wget packages. For the detailed security status of wget please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wget Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org