poky/meta/recipes-extended/wget
Divya Chellam b84adcd947 wget: fix CVE-2024-10524
Applications that use Wget to access a remote resource using
shorthand URLs and pass arbitrary user credentials in the URL
are vulnerable. In these cases attackers can enter crafted
credentials which will cause Wget to access an arbitrary host.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-10524

Upstream-patch:
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778

(From OE-Core rev: 425c3f55bd316a563597ff6ff95f8104848e2f10)

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-01-24 07:59:38 -08:00
..
wget wget: fix CVE-2024-10524 2025-01-24 07:59:38 -08:00
wget_1.21.4.bb wget: fix CVE-2024-10524 2025-01-24 07:59:38 -08:00
wget.inc wget: upgrade 1.21.3 -> 1.21.4 2023-06-16 15:40:11 +01:00