[3.6] wget: Buffer overflow vulnerability (CVE-2019-5953)
A buffer overflow vulnerability was found in GNU Wget 1.20.1 and
earlier. An attacker may be able
to cause a denial-of-service (DoS) or may execute an arbitrary code.
Fixed In Version:
wget 1.20.3
Reference:
https://jvn.jp/en/jp/JVN25261088/
Patch:
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17
(cosmetic, removes debug lines)
(from redmine: issue id 10214, created on 2019-04-08, closed on 2019-04-15)
- Relations:
- parent #10210 (closed)
- Changesets:
- Revision 4fe04b97 on 2019-04-08T11:47:25Z:
main/wget: security upgrade to 1.20.3 (CVE-2019-5953)
Fixes #10214