Fixes the following security issue: - CVE-2022-41751: Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing them in a JPEG filename and then using the regeneration -rgt50 option. Update readme.txt hash after a minor tweak of the text:a0eed69daa
Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit39ffadd6ae
) Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
4 lines
227 B
Plaintext
4 lines
227 B
Plaintext
# Locally calculated from download (no sig, hash)
|
|
sha256 999a81b489c7b2a7264118f194359ecf4c1b714996a2790ff6d5d2f3940f1e9f jhead-3.08.tar.gz
|
|
sha256 b3971a74d00c834bc7f112d8a0027b25663fd1637a21381a3e5df4bd2b614dff readme.txt
|