commit | e46df9d47e5b3a90f0a010026881ec22462fe502 | [log] [tgz] |
---|---|---|
author | y <rtmitchell@google.com> | Thu Apr 05 17:57:27 2018 -0700 |
committer | Ryan Mitchell <rtmitchell@google.com> | Fri Apr 06 18:12:42 2018 +0000 |
tree | 1b4176aa65927b56193c7570d0da9b534d3a7ba5 | |
parent | 28faced9734d509f8829ea710fe93bf33a4be324 [diff] |
ResStringPool: Fix security vulnerability Adds detection of attacker-modified size and data fields passed to ResStringPool::setTo(). These attacks are modified apks that AAPT would not normally generate. In the rare case this occurs, the installation cannot be allowed to continue. Bug: 71361168 Bug: 71360999 Test: run cts -m CtsAppSecurityHostTestCases \ -t android.appsecurity.cts.CorruptApkTests Change-Id: If7eb93a9e723b16c8a0556fc4e20006aa0391d57