{"id":"MGASA-2014-0431","summary":"Updated wget packages fix CVE-2014-4877","details":"Updated wget package fixes security vulnerability:\n\nWget was susceptible to a symlink attack which could create arbitrary\nfiles, directories or symbolic links and set their permissions when\nretrieving a directory recursively through FTP (CVE-2014-4877).\n\nThe default settings in wget have been changed such that wget no longer\ncreates local symbolic links, but rather traverses them and retrieves the\npointed-to file in such a retrieval. The old behaviour can be attained by\npassing the --retr-symlinks=no option to the wget command.\n","modified":"2026-04-16T06:23:01.783498057Z","published":"2014-10-28T11:33:36Z","upstream":["CVE-2014-4877"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0431.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14386"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181"}],"affected":[{"package":{"name":"wget","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/wget?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.14-2.2.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0431.json"}},{"package":{"name":"wget","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/wget?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.14-4.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0431.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}