Описание
Security update for wget2
This update for wget2 fixes the following issues:
Changes in wget2:
-
Update to release 2.2.1
- Fix file overwrite issue with metalink [CVE-2025-69194 bsc#1255728]
- Fix remote buffer overflow in get_local_filename_real() [CVE-2025-69195 bsc#1255729]
- Fix a redirect/mirror regression from 400713ca
- Use the local system timestamp when requested via --no-use-server-timestamps
- Prevent file truncation with --no-clobber
- Improve messages about why URLs are not being followed
- Fix metalink with -O/--output-document
- Fix sorting of metalink mirrors by priority
- Add --show-progress to improve backwards compatibility to wget
- Fix buffer overflow in wget_iri_clone() after wget_iri_set_scheme()
- Allow 'no_' prefix in config options
- Use libnghttp2 for HTTP/2 testing
- Set exit status to 8 on 403 response code
- Fix convert-links
- Fix --server-response for HTTP/1.1
-
Update to release 2.2.0
- Don't truncate file when -c and -O are combined
- Don't log URI userinfo to logs
- Fix downloading multiple files via HTTP/2
- Support connecting with HTTP/1.0 proxies
- Ignore 1xx HTTP responses for HTTP/1.1
- Disable TCP Fast Open by default
- Fix segfault when OCSP response is missing
- Add libproxy support
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1255728
- SUSE Bug 1255729
- SUSE CVE CVE-2025-69194 page
- SUSE CVE CVE-2025-69195 page
Описание
A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user's environment.
Затронутые продукты
Ссылки
- CVE-2025-69194
- SUSE Bug 1255728
Описание
A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
Затронутые продукты
Ссылки
- CVE-2025-69195
- SUSE Bug 1255729