]> sjero.net Git - wget/blobdiff - src/connect.c
[svn] Fix escape chars in server response vulnerability. Server response is
[wget] / src / connect.c
index ff7a741c2c198b6c2e348251595447bb178af474..40efc3630517bbaa55642ad6f9587898a22c1108 100644 (file)
@@ -269,8 +269,8 @@ connect_to_ip (const ip_address *ip, int port, const char *print)
     {
       const char *txt_addr = pretty_print_address (ip);
       if (print && 0 != strcmp (print, txt_addr))
-       logprintf (LOG_VERBOSE,
-                  _("Connecting to %s|%s|:%d... "), print, txt_addr, port);
+       logprintf (LOG_VERBOSE, _("Connecting to %s|%s|:%d... "),
+                  escnonprint (print), txt_addr, port);
       else
        logprintf (LOG_VERBOSE, _("Connecting to %s:%d... "), txt_addr, port);
     }