wget: upgrade to 1.16

Among other things, fixes CVE-2014-4877:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4877

(From OE-Core rev: de31ee56e07fea9e3f8ae2f71c69ab5e9c48836f)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Paul Eggleton 2014-10-31 18:05:08 +00:00 committed by Richard Purdie
parent 07e8ae71e8
commit a4db2d9630
2 changed files with 8 additions and 7 deletions

View File

@ -1,7 +0,0 @@
SRC_URI = "${GNU_MIRROR}/wget/wget-${PV}.tar.gz \
file://fix_makefile.patch \
"
SRC_URI[md5sum] = "506df41295afc6486662cc47470b4618"
SRC_URI[sha256sum] = "52126be8cf1bddd7536886e74c053ad7d0ed2aa89b4b630f76785bac21695fcd"
require wget.inc

View File

@ -0,0 +1,8 @@
SRC_URI = "${GNU_MIRROR}/wget/wget-${PV}.tar.gz \
file://fix_makefile.patch \
"
SRC_URI[md5sum] = "293a37977c41b5522f781d3a3a078426"
SRC_URI[sha256sum] = "b977fc10ac7a72d987d48136251aeb332f2dced1aabd50d6d56bdf72e2b79101"
require wget.inc