-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : wget Version : 1.13.4-3+deb7u6 CVE ID : CVE-2018-0494 Debian Bug : 898076
Harry Sintonen have discovered a cookie injection vulnerability in wget caused by insufficient input validation, enabling an external attacker to inject arbitrary cookie values cookie jar file, adding new or replacing existing cookie values. For Debian 7 "Wheezy", these problems have been fixed in version 1.13.4-3+deb7u6. We recommend that you upgrade your wget packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE7xPqJqaY/zX9fJAuhj1N8u2cKO8FAlr1RmgACgkQhj1N8u2c KO8gDQ/+LpPM46ysow+bkjJxnPH6lTICeLio+YKQb19EB3Rmfv/nhR8NbyQW2/3A VMr66eFojEDn+LqIyzaM0NOVFxWcVk2bOrNG+yWO3O3MFsHPlQvJanYPWCibHYoZ tsVndXK8MrtiwZ4TGguN1DvM/JrOJIPtEfiYj6eWdPzT8xNB0qIyskzEBvNHa3Le YcPZcZoiSFVNifPYlRA5eTKD4tEdkl/b57thl+Am26G+t/fC5Bb95X1erwG+Ofxe 54KI6JRoMB1Oq5FnRz6v1mldvAty9qDGF3I0XXj8svlVOkHlDfnAqrUl0LD4vL/Y LurXXIL5FxsReP3w+UkHjVWIItbBoS+rrnsVxCYb1QQhwja9rjXDyvvzrz6hnjMU xlYTKhNf7d+5NDvA6kYppisitPrcFd6IO9bjjYWKzgU8ZyOR0VgA3zWOCRAV07nt 6qSC89Vc8BAc3av9e+/DWX19Ah+S9V5tUCd3MATFed1X/zqORo0xpxMSF0zS3Fuh Dohsd6q4T7cfbMHV/cbpCgm/yAANru+jonDvnp5cb8fWJYV9jU3l7Sna65a18HV+ BsxtJdPf5tat+zzbg1KPJA94Aod5NcCQDHJ2ki3IXzE56WeTzjc4ys+RatfkuIYq YaaVmNxxfPage3c5B4zWQSze2tdJsJlW8ROGmAKOtIt60IvLcnI= =MnhF -----END PGP SIGNATURE-----
