32807795 Security Vulnerability - AOSP Messaging App: thirdparty can
attach private files from "/data/data/com.android.messaging/" directory to the messaging app. * This is a manual merge from ag/871758 -- backporting a security fix from Bugle to Kazoo. * Don't export the MediaScratchFileProvider or the MmsFileProvider. This will block external access from third party apps. In addition, make both providers more robust in handling path names. Make sure the file paths handled in the providers point to the expected directory. Change-Id: I9e6b3ae0e122e3f5022243418f2893d4a0859edb Fixes: 32807795
Showing
- AndroidManifest.xml 4 additions, 2 deletionsAndroidManifest.xml
- src/com/android/messaging/datamodel/MediaScratchFileProvider.java 17 additions, 1 deletion...android/messaging/datamodel/MediaScratchFileProvider.java
- src/com/android/messaging/datamodel/MmsFileProvider.java 18 additions, 1 deletionsrc/com/android/messaging/datamodel/MmsFileProvider.java
Please register or sign in to comment