diff options
| author | 2018-04-05 17:57:27 -0700 | |
|---|---|---|
| committer | 2018-04-06 18:12:42 +0000 | |
| commit | e46df9d47e5b3a90f0a010026881ec22462fe502 (patch) | |
| tree | 1b4176aa65927b56193c7570d0da9b534d3a7ba5 /cmds/bootanimation/BootAnimationUtil.cpp | |
| parent | 28faced9734d509f8829ea710fe93bf33a4be324 (diff) | |
ResStringPool: Fix security vulnerability
Adds detection of attacker-modified size and data fields passed to
ResStringPool::setTo(). These attacks are modified apks that AAPT would
not normally generate. In the rare case this occurs, the installation
cannot be allowed to continue.
Bug: 71361168
Bug: 71360999
Test: run cts -m CtsAppSecurityHostTestCases \
-t android.appsecurity.cts.CorruptApkTests
Change-Id: If7eb93a9e723b16c8a0556fc4e20006aa0391d57
Diffstat (limited to 'cmds/bootanimation/BootAnimationUtil.cpp')
0 files changed, 0 insertions, 0 deletions