39ffadd6ae
Fixes the following security issue:
- CVE-2022-41751: Jhead 3.06.0.1 allows attackers to execute arbitrary OS
commands by placing them in a JPEG filename and then using the
regeneration -rgt50 option.
Update readme.txt hash after a minor tweak of the text:
a0eed69daa
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
22 lines
586 B
Makefile
22 lines
586 B
Makefile
################################################################################
|
|
#
|
|
# jhead
|
|
#
|
|
################################################################################
|
|
|
|
JHEAD_VERSION = 3.08
|
|
JHEAD_SITE = $(call github,Matthias-Wandel,jhead,$(JHEAD_VERSION))
|
|
JHEAD_LICENSE = Public Domain
|
|
JHEAD_LICENSE_FILES = readme.txt
|
|
JHEAD_CPE_ID_VENDOR = jhead_project
|
|
|
|
define JHEAD_BUILD_CMDS
|
|
$(TARGET_MAKE_ENV) $(MAKE) $(TARGET_CONFIGURE_OPTS) -C $(@D)
|
|
endef
|
|
|
|
define JHEAD_INSTALL_TARGET_CMDS
|
|
$(INSTALL) -m 0755 -D $(@D)/jhead $(TARGET_DIR)/usr/bin/jhead
|
|
endef
|
|
|
|
$(eval $(generic-package))
|