Headline
CVE-2023-35683
In bindSelection of DatabaseUtils.java, there is a possible way to access files from other applications due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
)]}’ { "commit": "23d156ed1bed6d2c2b325f0be540d0afca510c49", "tree": "f54e4f4739f4a720de25255369dd018bae3b8a54", "parents": [ “192c7711c1adc835c06720d59ddacb86c5e32b5f” ], "author": { "name": "Krishang Garodia", "email": "[email protected]", "time": “Mon Jun 19 11:43:45 2023 +0000” }, "committer": { "name": "Android Build Coastguard Worker", "email": "[email protected]", "time": “Fri Jul 14 17:32:33 2023 +0000” }, "message": "Remove invalid surrogates during bindSelection\n\nTest: atest MediaProviderTests\nBug: 223793631\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:108f736d0ec6e974c3f947e7e568845b7e039a0a)\n(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:a48b01f78f28fc642b144c673bfcd12ae78c5a73)\nMerged-In: I18b879f1a51394b4739225ec88b862fd6d0d5526\nChange-Id: I18b879f1a51394b4739225ec88b862fd6d0d5526\n", "tree_diff": [ { "type": "modify", "old_id": "55efafc7f79911ea4d1a6e57b01d745c277aaf4a", "old_mode": 33188, "old_path": "src/com/android/providers/media/util/DatabaseUtils.java", "new_id": "53ecf964eef6d0a075c3af85a713744decb648f9", "new_mode": 33188, "new_path": “src/com/android/providers/media/util/DatabaseUtils.java” }, { "type": "modify", "old_id": "685d897041ef04ba469574150494f0b0c1ed316d", "old_mode": 33188, "old_path": "tests/src/com/android/providers/media/util/DatabaseUtilsTest.java", "new_id": "a907875898476236c1f5de7e25812fdf928509a1", "new_mode": 33188, "new_path": “tests/src/com/android/providers/media/util/DatabaseUtilsTest.java” } ] }
Related news
In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.