summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-support/sharutils/sharutils_4.15.2.bb
Commit message (Collapse)AuthorAgeFilesLines
* sharutils 4.15.2: BBCLASSEXTEND to native and nativesdkHenrik Nymann Jensen (HNJE)2018-12-201-0/+2
| | | | | Signed-off-by: Henrik Nymann Jensen <hnje@triax.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* sharutils: CVE-2018-1000097Sinan Kaya2018-10-161-0/+1
| | | | | | | | | | | | | | | | | *CVE Sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file.. Affects = 4.15.2 CVE: CVE-2018-1000097 Ref: https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000097.html?_ga=2.104716162.363845622.1539703460-954328166.1533363715 Signed-off-by: Sinan Kaya <okaya@kernel.org> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* sharutils: Upgrade to 4.15.2Khem Raj2017-04-241-0/+21
Fix format error warnings with clang Signed-off-by: Khem Raj <raj.khem@gmail.com>