Fix security vulnerability in CryptoHal
CryptoHal was not checking that the memory heap set by setHeap was the same one that was actually used for the decrypt call, allowing the caller to spoof the decrypt call into accessing arbitrary memory. bug:76221123 test: mediadrmserverpoc included in the bug & GTS media tests Change-Id: I35214a1a6d0a4b864123e147d1a1adc2377bfbc5 Merged-in: I4ae6d1080be406bf53e3617c59c75206cc5066c6 (cherry picked from commit 9a9c3ab4)
Loading
Please register or sign in to comment