diff options
author | Jeff Sharkey <jsharkey@android.com> | 2016-11-21 10:33:54 -0700 |
---|---|---|
committer | Jeff Sharkey <jsharkey@android.com> | 2017-03-13 12:46:49 -0600 |
commit | 646dde0ace455447b772443f7965ff0101fb5834 (patch) | |
tree | 6bb2c5848950b616442f017c93f371352e89c68b /tools/aapt2/java/JavaClassGenerator_test.cpp | |
parent | a5af24cd02f9dadbea7d23c59ce5f04ce045080d (diff) |
No direct Uri grants from system.
The system should never be extending Uri permission grants from
itself, since it automatically holds all the permissions. Instead,
the system should always be a mediator between two specific apps, and
it should be using startActivityAsCaller() if it needs to extend
permissions.
Blocking at this level fixes an entire class of confused deputy
security issues.
There is a small exemption for the "com.android.settings.files"
authority which is used for photo cropping in the Settings app.
Test: builds, normal intent resolution UI works
Bug: 33019296, 35158271
Change-Id: I3f0de58facedab8767541291b5dfa022fa2e4414
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator_test.cpp')
0 files changed, 0 insertions, 0 deletions