286fd5652a9804bfd185980dc07ad239e1169929
SQLiteQueryBuilder has a setStrict() mode which can be used to detect SQL attacks from untrusted sources, which it does by running each query twice: once with an extra set of parentheses, and if that succeeds, it runs the original query verbatim. This sadly doesn't catch inputs of the type "1=1) OR (1=1", which creates valid statements for both tests above, but the final executed query ends up leaking data due to SQLite operator precedence. Instead, we need to continue compiling both variants, but we need to execute the query with the additional parentheses to ensure data won't be leaked. Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java Bug: 111085900 Change-Id: I6e8746fa48f9de13adae37d2990de11c9c585381 Merged-In: I6e8746fa48f9de13adae37d2990de11c9c585381
…
…
…
…
…
…
…
[automerger] Fix issue #27317952: PendingIntent.getIntent() should be protected am:
ae77fa4725 am: d6b6319286 am: 73fcfd424e
…
…
…
[automerger] Fixed Security Vulnerability of DcParamObject am:
8c55a70728 am: 61f84448eb am: a007cb0734 am: 3b356d5111
…
…
[automerger] [RTT] ParcelableRttResults parcel code fix am:
e1e5a2409c am: 5f4d9350f4 am: 8d2d052b61 am: af9f48b7e8
…
Description
No description provided
Languages
Java
73.7%
Kotlin
14%
PowerBuilder
5.8%
C++
5.2%
AIDL
1%