commit | b81b1aa7a2c48331a1bf8fd75fa8bb97cb6b4e6a | [log] [tgz] |
---|---|---|
author | Grace Jia <xiaotonj@google.com> | Thu Jul 20 13:42:50 2023 -0700 |
committer | Fairphone ODM <fairphone-odm@localhost> | Mon Sep 25 15:21:13 2023 +0800 |
tree | eb48c9fe4d7a8cd076ef76a0d81f1513d70484bc | |
parent | 87dfcffbf177c9dd14b42935e080db85da81691e [diff] |
Fix vulnerability in CallRedirectionService. Currently when the CallRedirectionService binding died, we didn't do anything, which cause malicious app start activities even not run in the background by implementing a CallRedirectionService and overriding the onPlaceCall method to schedule a activity start job in an independent process and then kill itself. In that way, the activity can still start after the CallRedirectionService died. Fix this by unbinding the service when the binding died. Bug: b/289809991 Test: Using testapp provided in bug to make sure the test activity can't be started (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:29b52e3cd027da2d8644450a4dee3a7d95dc0043) Merged-In: I065d361b83700474a1efab2a75928427ee0a14ba Change-Id: I065d361b83700474a1efab2a75928427ee0a14ba (cherry picked from commit ef0677f0e29bd5a4d1e26abd6317129b5d53bfdf)