summaryrefslogtreecommitdiff
path: root/libs/androidfw/Util.cpp
diff options
context:
space:
mode:
author Chiachang Wang <chiachangwang@google.com> 2022-03-08 10:50:14 +0800
committer Chiachang Wang <chiachangwang@google.com> 2022-05-26 06:19:51 +0000
commit6390b37a3b32fc7583154d53fda3af8fbd95f59f (patch)
treed1a2667ac1304deac17a267c18d7cf5b1c0a509d /libs/androidfw/Util.cpp
parent53ac502a1a2276771ff36037fbcb5225f17a744e (diff)
Stop using invalid URL to prevent unexpected crash
Verify the input PAC Uri before performing follow-up actions. Check if the URL is a valid URL to filter some invalid URLs since these invalid URLs could not fall into any subclass of existing URLConnections. When the PAC Uri is other invalid URL scheme, it will cause an UnsupportedOperationException if there is no proper subclass that implements the openConnection() method. A malformed URL may crash the system. Even it's a valid URL, some subclasses(e.g. JarURLConnection) may not have openConnection() implemented. It will also hit the problem, so convert the possbile exception from openConnection() to re-throw it to IOException which is handled in the existing code. Bug: 219498290 Test: atest FrameworksNetTests CtsNetTestCases Test: Test with malformed URL Change-Id: I22903414380b62051f514e43b93af992f45740b4
Diffstat (limited to 'libs/androidfw/Util.cpp')
0 files changed, 0 insertions, 0 deletions