Bug 24625

Summary: wget new buffer overflow security issues fixed upstream (including CVE-2019-5953)
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: andrewsfarm, davidwhodgins, lists.jjorge, mageia, sysadmin-bugs
Version: 6Keywords: advisory, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA6-64-OK
Source RPM: wget-1.20.1-1.mga6.src.rpm CVE:
Status comment:

Description David Walser 2019-04-05 21:58:34 CEST
Versions 1.20.2 and 1.20.3 have been released this week, fixing buffer overflows:
http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html
http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00015.html
Comment 1 José Jorge 2019-04-06 08:12:12 CEST
Pushed to testing. Suggested advisory :

Wget 1.20.3 fixes buffer overflow vulnerability.
Ref :
http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html
http://lists.gnu.org/archive/html/bug-wget/2019-04/msg00015.html

Single RPM:
wget-1.20.3-1.mga6

Assignee: lists.jjorge => qa-bugs
Status: NEW => ASSIGNED
CC: (none) => lists.jjorge

Comment 2 PC LX 2019-04-09 13:20:49 CEST
Installed and tested without issues.

System: Mageia 6, x86_64, Intel CPU.

Tested http, https, ftp, http proxy.

$ uname -a
Linux marte 4.14.106-desktop-1.mga6 #1 SMP Thu Mar 14 18:01:29 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
$ rpm -q wget
wget-1.20.3-1.mga6

CC: (none) => mageia
Whiteboard: (none) => MGA6-64-OK

Comment 3 Thomas Andrews 2019-04-10 03:05:27 CEST
Validating. Suggested advisory in Comment 1.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Dave Hodgins 2019-04-10 22:05:56 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 4 Mageia Robot 2019-04-10 23:26:49 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2019-0143.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED

Comment 5 David Walser 2019-04-22 22:35:40 CEST
Debian has issued an advisory for this on April 5:
https://www.debian.org/security/2019/dsa-4425

It looks like CVE-2019-5953 probably refers to the issue fixed in 1.20.3.

Summary: wget new buffer overflow security issues fixed upstream => wget new buffer overflow security issues fixed upstream (including CVE-2019-5953)