Summary: | <net-misc/wget-1.16.3-r1: IP address exposure via FTP PORT command | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=075d7556964f5a871a73c22ac4b69f5361295099 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1260921 | ||
Whiteboard: | A4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2015-09-14 09:17:03 UTC
added upstream patch in 1.16.3-r1. should be fine for stable. http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ed1e5984dd18412d94ee20624acbdfa10c3f994a Arches, please test and mark stable: =net-misc/wget-1.16.3-r1 Target keywords : "alpha amd64 arm arm64 hppa ia64 ppc ppc64 s390 sh sparc x86" amd64 stable x86 stable Stable for HPPA PPC64. Stable on alpha. ppc stable arm stable sparc stable New GLSA request filed. This issue was resolved and addressed in GLSA 201610-11 at https://security.gentoo.org/glsa/201610-11 by GLSA coordinator Kristian Fiskerstrand (K_F). |