<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0132</id>
    <title>An update for wget is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2025-03-15 12:21:02"/>
    <updated date="2025-03-15 12:21:02"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524" id="CVE-2024-10524" title="CVE-2024-10524 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. (CVE-2024-10524)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="wget">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="wget" version="1.21.2" release="1.r2.hce2">
          <filename>wget-1.21.2-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="wget-help" version="1.21.2" release="1.r2.hce2">
          <filename>wget-help-1.21.2-1.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="wget" version="1.21.2" release="1.r2.hce2">
          <filename>wget-1.21.2-1.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="wget-help" version="1.21.2" release="1.r2.hce2">
          <filename>wget-help-1.21.2-1.r2.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
