Date: Fri, 15 Apr 2005 23:51:30 +0200 From: "Simon L. Nielsen" <simon@FreeBSD.org> To: Steve Clement <steve@ion.lu> Cc: ports@FreeBSD.org Subject: Re: FreeBSD Port: wget-1.8.2_6 Message-ID: <20050415215130.GC776@zaphod.nitro.dk> In-Reply-To: <425FB8E7.4000707@ion.lu> References: <1933346976.20050122135540@klax.tula.ru> <20050122131231.GB823@zaphod.nitro.dk> <425FB8E7.4000707@ion.lu>
next in thread | previous in thread | raw e-mail | index | archive | help
--3siQDZowHQqNOShm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2005.04.15 14:51:51 +0200, Steve Clement wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 >=20 > Simon L. Nielsen wrote: >=20 > > The security issues in wget are somewhat fundamental and not easy > > to fix. There are currently no fix available, and I have no idea > > when (or if) there will be a fix available. >=20 > Indeed, what would be a good or even better equivalent? >=20 > ftp/prozilla > ftp/mget > ftp/wgetpro >=20 > so many to chose from :) As flz said, wgetpro is also affected by the vulnerabilities, I don't know the other ones. The new wget 1.10alpha1 and newer aren't affected, so I just updated VuXML to state this. Note that I haven't tried the new wget, so I don't know how stable etc. it is, but it might be with a try (it's the ftp/wget-devel port at the moment). --=20 Simon L. Nielsen --3siQDZowHQqNOShm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (FreeBSD) iD8DBQFCYDdih9pcDSc1mlERAnSuAJwLKeA1O2L6htnyf81tzRXdIoarEgCggp47 1NXtVwZGKqIo5kcl3JqOfaE= =8IYE -----END PGP SIGNATURE----- --3siQDZowHQqNOShm--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050415215130.GC776>