summaryrefslogtreecommitdiff
path: root/rs/java/android/renderscript/ProgramStore.java
diff options
context:
space:
mode:
authorCurtis Belmonte <curtislb@google.com>2020-09-30 15:13:17 -0700
committerCurtis Belmonte <curtislb@google.com>2020-09-30 17:50:44 -0700
commitcefe7b3cee7a864807bb2f51116d0b3c9729ccd0 (patch)
treef0295108ef2d7324958f0d9c7cf9c26b7fc4231b /rs/java/android/renderscript/ProgramStore.java
parent22b7c8fcdca60d82736b82e62da06f9645842e46 (diff)
Check fingerprint client against top activity in auth callback
Due to a race condition with activity task stack broadcasts, it's currently possible for fingerprint authentication to succeed for a non-top activity. This means, for example, that a malicious overlay could be drawn in order to mislead the user about what they are authenticating for. This commit addresses the issue by adding a check to the onAuthenticated() callback of the fingerprint HAL result controller to ensure that the authenticating activity is on top at the time of authentication. Otherwise, the pending authentication will be canceled. Test: Follow steps from b/159249069: 1. Install com.pro100svitlo.fingerprintauthdemo from the Play store. 2. Install the PoC attack app from b/159249069. 3. Start the PoC attack app and press the "Launch PoC attack" button. 4. Use fingerprint to authenticate while the overlay is showing. Before: Authentication succeeds, and a new activity is launched. After: Authentication is canceled, and no new activity is launched. Bug: 159249069 Change-Id: I289d67e5c7055ed60f7a96725c523d07cd047b23
Diffstat (limited to 'rs/java/android/renderscript/ProgramStore.java')
0 files changed, 0 insertions, 0 deletions