diff options
| author | 2022-10-04 19:43:58 +0000 | |
|---|---|---|
| committer | 2022-10-04 22:07:34 +0000 | |
| commit | eb9a0566a583fa13f8aff671c41f78a9e33eab82 (patch) | |
| tree | f91ff5f1f1d6b8c33163f840582f6fd6ca057a02 /libs/androidfw/ResourceTimer.cpp | |
| parent | 8a2baf4e16bc751c2fd4ff0e8219e8ffa4aeaae9 (diff) | |
Add safety checks on KEY_INTENT mismatch.
For many years, Parcel mismatch typed exploits has been using the
AccoungManagerService's passing of KEY_INTENT workflow, as a foothold of
launching arbitrary intents. We are adding an extra check on the service
side to simulate the final deserialization of the KEY_INTENT value, to
make sure the client side won't get a mismatched KEY_INTENT value.
Bug: 250588548
Bug: 240138294
Test: atest CtsAccountManagerTestCases
Test: local test, also see b/250588548
Change-Id: I433e34f6e21ce15c89825044a15b1dec46bb25cc
Diffstat (limited to 'libs/androidfw/ResourceTimer.cpp')
0 files changed, 0 insertions, 0 deletions