Fix a vulnerable query from sql injection 76/128776/1
authorSangyoon Jang <s89.jang@samsung.com>
Thu, 11 May 2017 09:55:29 +0000 (18:55 +0900)
committerSangyoon Jang <s89.jang@samsung.com>
Thu, 11 May 2017 09:55:29 +0000 (18:55 +0900)
Change-Id: Iae26050885188d4335f0500d118363e9bb68a9c9
Signed-off-by: Sangyoon Jang <s89.jang@samsung.com>
src/pkgmgrinfo_appinfo.c

index d1cc70d..1529a85 100644 (file)
@@ -431,7 +431,7 @@ static int __get_appinfo_for_uid(sqlite3 *db, application_x *info, uid_t uid)
 {
        static const char query_raw[] =
                "SELECT is_splash_screen_enabled, is_disabled "
-               "FROM package_app_info_for_uid WHERE app_id='%s' AND uid='%d'";
+               "FROM package_app_info_for_uid WHERE app_id=%Q AND uid=%d";
        int ret;
        char *query;
        char *is_disabled = NULL;