Backport of Win-specific suppression of potentially rogue construct that can engage...
authorShaju Mathew <shaju@google.com>
Tue, 5 Apr 2022 14:45:28 +0000 (14:45 +0000)
committerRoger Shimizu <rosh@debian.org>
Fri, 27 Jan 2023 05:43:52 +0000 (05:43 +0000)
commitb5441b3b373db881c21cfa64f96ef752356e7146
treef577fc45603340338479a3c60dd62e6d14688e2f
parentc191d0c8d41f89390a20f8e7e187756bba027bfe
Backport of Win-specific suppression of potentially rogue construct that can engage in directory traversal on the host.

Bug:209438553

Ignore-AOSP-First: Resolution for potential security exploit.

Test: Relying on presubmits for now.
Will followup with a full-fledged sync and manual cursory test.

Merged-In: Ie1f82db2fb14e1bdd183bf8d3d93d5e9f974be5d
Change-Id: I2a5da348eba104a7d06d6c0acb3cd56b770142a1

Gbp-Pq: Topic cve
Gbp-Pq: Name CVE-2022-20128.patch
system/core/adb/client/file_sync_client.cpp