6f0a81de6b
Fix CVE-2021-3119: Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes a segmentation fault. https://github.com/sqlcipher/sqlcipher/blob/v4.4.3/CHANGELOG.md Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
44 lines
1.2 KiB
Makefile
44 lines
1.2 KiB
Makefile
################################################################################
|
|
#
|
|
# sqlcipher
|
|
#
|
|
################################################################################
|
|
|
|
SQLCIPHER_VERSION = 4.4.3
|
|
SQLCIPHER_SITE = $(call github,sqlcipher,sqlcipher,v$(SQLCIPHER_VERSION))
|
|
SQLCIPHER_LICENSE = BSD-3-Clause
|
|
SQLCIPHER_LICENSE_FILES = LICENSE
|
|
SQLCIPHER_CPE_ID_VENDOR = zetetic
|
|
SQLCIPHER_DEPENDENCIES = host-pkgconf openssl host-tcl
|
|
SQLCIPHER_INSTALL_STAGING = YES
|
|
|
|
SQLCIPHER_CONF_ENV = \
|
|
CFLAGS="$(TARGET_CFLAGS) $(SQLCIPHER_CFLAGS)" \
|
|
TCLSH_CMD=$(HOST_DIR)/bin/tclsh$(TCL_VERSION_MAJOR)
|
|
|
|
SQLCIPHER_CONF_OPTS = \
|
|
--enable-threadsafe \
|
|
--disable-tcl
|
|
|
|
SQLCIPHER_CFLAGS += -DSQLITE_HAS_CODEC # Required according to the README
|
|
SQLCIPHER_CONF_ENV += LIBS=`$(PKG_CONFIG_HOST_BINARY) --libs openssl`
|
|
|
|
ifeq ($(BR2_PACKAGE_SQLCIPHER_STAT3),y)
|
|
SQLCIPHER_CFLAGS += -DSQLITE_ENABLE_STAT3
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_SQLCIPHER_READLINE),y)
|
|
SQLCIPHER_DEPENDENCIES += ncurses readline
|
|
SQLCIPHER_CONF_OPTS += --with-readline-inc="-I$(STAGING_DIR)/usr/include"
|
|
else
|
|
SQLCIPHER_CONF_OPTS += --disable-readline
|
|
endif
|
|
|
|
ifeq ($(BR2_STATIC_LIBS),y)
|
|
SQLCIPHER_CONF_OPTS += --disable-load-extension
|
|
else
|
|
SQLCIPHER_CONF_OPTS += --enable-load-extension
|
|
endif
|
|
|
|
$(eval $(autotools-package))
|