Backport of Win-specific suppression of potentially rogue construct that can engage...
authorShaju Mathew <shaju@google.com>
Tue, 5 Apr 2022 14:45:28 +0000 (14:45 +0000)
committerRoger Shimizu <rosh@debian.org>
Tue, 31 Jan 2023 07:58:29 +0000 (07:58 +0000)
commit9c436599b4fb4d05e402c346df737535e1e6bfa8
tree11e3a4f9096768fe6a014c09ce5f88963b4f7020
parent22beecfd54f6fa6eda5e5d0e2add37ba0ded7559
Backport of Win-specific suppression of potentially rogue construct that can engage in directory traversal on the host.

Bug:209438553

Ignore-AOSP-First: Resolution for potential security exploit.

Test: Relying on presubmits for now.
Will followup with a full-fledged sync and manual cursory test.

Merged-In: Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d
Change-Id: I2a5da348eba104a7d06d6c0acb3cd56b770142a1

Gbp-Pq: Topic cve
Gbp-Pq: Name CVE-2022-20128.patch
system/core/adb/client/file_sync_client.cpp