CVE-2019-5953

Priority
Description
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to
cause a denial-of-service (DoS) or may execute an arbitrary code via
unspecified vectors.
Notes
mdeslauractually fixed in 1.20.3, not in 1.20.2
Package
Source: wget (LP Ubuntu Debian)
Upstream:released (1.20.3)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.13.4-2ubuntu1.7)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.15-1ubuntu1.14.04.5)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.17.1-1ubuntu1.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.19.4-1ubuntu2.2)
Patches:
Upstream:https://git.savannah.gnu.org/cgit/wget.git/commit/?id=692d5c5215de0db482c252492a92fc424cc6a97c
Upstream:https://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17
More Information

Updated: 2020-07-28 20:07:45 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)