Hi No??l
On Fri, Apr 05, 2019 at 02:42:48PM +0200, Salvatore Bonaccorso wrote:
> Hi,
>
> On Thu, Apr 04, 2019 at 01:07:37PM +0200, Salvatore Bonaccorso wrote:
> > Hi,
> >
> > On Thu, Apr 04, 2019 at 12:40:32PM +0200, Salvatore Bonaccorso wrote:
> > > Source: wget
> > > Version: 1.20.1-1
> > > Se
Hi,
On Thu, Apr 04, 2019 at 01:07:37PM +0200, Salvatore Bonaccorso wrote:
> Hi,
>
> On Thu, Apr 04, 2019 at 12:40:32PM +0200, Salvatore Bonaccorso wrote:
> > Source: wget
> > Version: 1.20.1-1
> > Severity: important
> > Tags: security upstream fixed-upstream
> >
> > Hi,
> >
> > The following v
Hi,
On Thu, Apr 04, 2019 at 12:40:32PM +0200, Salvatore Bonaccorso wrote:
> Source: wget
> Version: 1.20.1-1
> Severity: important
> Tags: security upstream fixed-upstream
>
> Hi,
>
> The following vulnerability was published for wget.
>
> CVE-2019-5953[0]:
> Buffer overflow vulnerability
>
>
Source: wget
Version: 1.20.1-1
Severity: important
Tags: security upstream fixed-upstream
Hi,
The following vulnerability was published for wget.
CVE-2019-5953[0]:
Buffer overflow vulnerability
It was mentioned in the 1.20.2 release, [1]. It might be related to
[2], but not sure as the referenc
4 matches
Mail list logo