commit | ef3688b9477602323c487c14d98f782208ed70a8 | [log] [tgz] |
---|---|---|
author | Azhara Assanova <azharaa@google.com> | Tue Nov 01 11:50:40 2022 +0000 |
committer | Azhara Assanova <azharaa@google.com> | Tue Nov 08 14:48:26 2022 +0000 |
tree | 033e4be257e3a39b6d3d13fcdcac55970e044c09 | |
parent | 79605eb99412d26f63856d59bb559cb2d8078551 [diff] |
Disallow dangerous zip entry names Implement SafeZipPathValidatorCallback which throws ZipException if the zip entry name contains ".." or starts with "/". The callback is then set in RuntimeInit. This feature will be enabled for apps with targetSDK >= U. Bug: 252994429 Bug: 242716250 Test: atest FrameworksCoreTests:com.android.internal.os.SafeZipPathValidatorCallbackTest Change-Id: Idef0f78a9da86d7606681a8fbc3f61b1be99adaf