diff options
| author | 2022-12-13 17:02:10 -0600 | |
|---|---|---|
| committer | 2022-12-13 18:48:58 -0600 | |
| commit | 0a693d087c912c6e51b99b8f4761ed67163ab481 (patch) | |
| tree | 50330e6b8d41f124197b5a07d53fef25c3851ee8 /libs/androidfw/StringPool.cpp | |
| parent | 32765d94a13e1f1ba7d055805240b1884093da75 (diff) | |
Update receiver flag enforcement workaround for affected package
Android T allows apps to declare a runtime receiver as not exported
by invoking registerReceiver with a new RECEIVER_NOT_EXPORTED flag;
receivers registered with this flag will only receive broadcasts from
the platform and the app itself. However to ensure developers can
properly protect their receivers, all apps targeting U or later
registering a receiver for non-system broadcasts must specify either
the exported or not exported flag when invoking #registerReceiver;
if one of these flags is not provided, the platform will throw a
SecurityException. Some apps have already begun targeting U but
have not yet flagged their exposed receivers; this commit updates the
exemption for these apps to prevent them from crashing due to this
new enforcement while their receivers are updated.
Bug: 262396031
Test: Manually verified all affected apps were exempted.
Change-Id: Ieeb9834632eafba4941c67a5d3ae764d7c781fb3
Diffstat (limited to 'libs/androidfw/StringPool.cpp')
0 files changed, 0 insertions, 0 deletions