In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
[
{
"vendor": "Google",
"product": "Android",
"versions": [
{
"version": "13",
"status": "affected"
},
{
"version": "12L",
"status": "affected"
},
{
"version": "12",
"status": "affected"
},
{
"version": "11",
"status": "affected"
}
],
"defaultStatus": "unaffected"
}
]