summaryrefslogtreecommitdiff
path: root/graphics/java/android/renderscript/ProgramFragmentFixedFunction.java
diff options
context:
space:
mode:
authorJeff Sharkey <jsharkey@android.com>2018-07-25 14:01:59 -0600
committerandroid-build-team Robot <android-build-team-robot@google.com>2018-08-16 16:39:57 +0000
commitd1da1d04b920cebd31c3b9be68f83e4a4de3675f (patch)
treeccab797f89938a393fb19b3b8b899231101abddc /graphics/java/android/renderscript/ProgramFragmentFixedFunction.java
parent3a701f90e93472011d1be9b590de0234ec8f8a84 (diff)
DO NOT MERGE. Execute "strict" queries with extra parentheses.
SQLiteQueryBuilder has a setStrict() mode which can be used to detect SQL attacks from untrusted sources, which it does by running each query twice: once with an extra set of parentheses, and if that succeeds, it runs the original query verbatim. This sadly doesn't catch inputs of the type "1=1) OR (1=1", which creates valid statements for both tests above, but the final executed query ends up leaking data due to SQLite operator precedence. Instead, we need to continue compiling both variants, but we need to execute the query with the additional parentheses to ensure data won't be leaked. Test: atest cts/tests/tests/database/src/android/database/sqlite/cts/SQLiteQueryBuilderTest.java Bug: 111085900 Change-Id: I6e8746fa48f9de13adae37d2990de11c9c585381 Merged-In: I6e8746fa48f9de13adae37d2990de11c9c585381 (cherry picked from commit 57b04a86802ff879af78e782a8582462323e34e7)
Diffstat (limited to 'graphics/java/android/renderscript/ProgramFragmentFixedFunction.java')
0 files changed, 0 insertions, 0 deletions