Bug 228070 - security/vuxml: Document cookie injection vulnerability in wget (CVE-2018-0494)
Summary: security/vuxml: Document cookie injection vulnerability in wget (CVE-2018-0494)
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Many People
Assignee: Ports Security Team
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-05-08 15:02 UTC by Yasuhiro Kimura
Modified: 2018-05-09 17:30 UTC (History)
1 user (show)

See Also:
bugzilla: maintainer-feedback? (ports-secteam)


Attachments
patch file (1.26 KB, patch)
2018-05-08 15:02 UTC, Yasuhiro Kimura
no flags Details | Diff
updated patch file (1.30 KB, patch)
2018-05-09 12:22 UTC, Yasuhiro Kimura
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Yasuhiro Kimura freebsd_committer freebsd_triage 2018-05-08 15:02:28 UTC
Created attachment 193181 [details]
patch file

Document cookie injection vulnerability of in wget (CVE-2018-0494).
Comment 1 Yasuhiro Kimura freebsd_committer freebsd_triage 2018-05-09 12:22:33 UTC
Created attachment 193204 [details]
updated patch file

Add information about FreeBSD bug report.
So please commit attached patch instead of original one.
Comment 2 Vasil Dimov freebsd_committer freebsd_triage 2018-05-09 17:30:30 UTC
Committed, thanks!