Skip to content

fix(wget2): CVE-2025-69194, CVE-2025-69195#3

Merged
Zeno-sole merged 2 commits into
masterfrom
fix/CVE-2025-69194-multi
May 21, 2026
Merged

fix(wget2): CVE-2025-69194, CVE-2025-69195#3
Zeno-sole merged 2 commits into
masterfrom
fix/CVE-2025-69194-multi

Conversation

@deepin-ci-robot
Copy link
Copy Markdown
Contributor

CVE Security Fix

This PR fixes two security vulnerabilities in wget2:

CVE-2025-69194 - Arbitrary File Write via Metalink Path Traversal

The application failed to properly validate file paths provided in Metalink <file name> elements. An attacker could abuse this behavior to write files to unintended locations on the system, leading to data loss or further compromise.

Fix: Add sanitized_filename() function to libwget/metalink.c that validates Metalink file names against path traversal attacks using ISSLASH/FILE_SYSTEM_PREFIX_LEN macros from filename.h.

Upstream: https://gitlab.com/gnuwget/wget2/-/commit/ab335eb3d5880080497b866a70344cc66d09bc2d

CVE-2025-69195 - Stack-based Buffer Overflow via Filename Sanitization

A stack-based buffer overflow occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, leading to memory corruption and potential crash.

Fix: Add sanitize_filename() function to libwget/http_parse.c that strips directory traversal sequences from Content-Disposition filenames.

Upstream: https://gitlab.com/gnuwget/wget2/-/commit/beba9c92d826ca3e8f9bc96e6c37fa669d822666


Generated-By: glm-5.1
Co-Authored-By: hudeng hudeng@deepin.org

deepin-ci-robot and others added 2 commits May 20, 2026 22:58
Add path traversal validation for Metalink <file name> elements.
The application failed to properly validate file paths provided in
Metalink documents, allowing an attacker to write files to unintended
locations on the system.

Backport of upstream commit ab335eb3d5880080497b866a70344cc66d09bc2d
which adds sanitized_filename() using ISSLASH/FILE_SYSTEM_PREFIX_LEN
macros from filename.h.

Upstream: https://gitlab.com/gnuwget/wget2/-/commit/ab335eb3d5880080497b866a70344cc66d09bc2d
Generated-By: glm-5.1
Co-Authored-By: hudeng <hudeng@deepin.org>
Sanitize filename from Content-Disposition header to prevent stack-based
buffer overflow in filename sanitization logic when processing
attacker-controlled URL paths, particularly when filename restriction
options are active.

Backport of upstream commit beba9c92d826ca3e8f9bc96e6c37fa669d822666
which adds sanitize_filename() to strip directory traversal sequences
from Content-Disposition filenames.

Upstream: https://gitlab.com/gnuwget/wget2/-/commit/beba9c92d826ca3e8f9bc96e6c37fa669d822666
Generated-By: glm-5.1
Co-Authored-By: hudeng <hudeng@deepin.org>
@github-actions
Copy link
Copy Markdown

TAG Bot

TAG: 2.1.0-2.1deepin3
EXISTED: no
DISTRIBUTION: unstable

@deepin-ci-robot
Copy link
Copy Markdown
Contributor Author

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign zccrs for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@hudeng-go
Copy link
Copy Markdown
Contributor

/integrate

@github-actions
Copy link
Copy Markdown

AutoIntegrationPr Bot
auto integrate with pr url: deepin-community/Repository-Integration#4053
PrNumber: 4053
PrBranch: auto-integration-26199670157

@Zeno-sole Zeno-sole merged commit 7fe9a0f into master May 21, 2026
6 of 8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants