[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1375-1] wget security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : wget
Version        : 1.13.4-3+deb7u6
CVE ID         : CVE-2018-0494
Debian Bug     : 898076


Harry Sintonen have discovered a cookie injection vulnerability in
wget caused by insufficient input validation, enabling an external
attacker to inject arbitrary cookie values cookie jar file, adding new
or replacing existing cookie values.

For Debian 7 "Wheezy", these problems have been fixed in version
1.13.4-3+deb7u6.

We recommend that you upgrade your wget packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=MnhF
-----END PGP SIGNATURE-----


Reply to: