Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Skip to content
Commit ef3688b9 authored by Azhara Assanova's avatar Azhara Assanova
Browse files

Disallow dangerous zip entry names

Implement SafeZipPathValidatorCallback which throws ZipException if the
zip entry name contains ".." or starts with "/". The callback is then
set in RuntimeInit.

This feature will be enabled for apps with targetSDK >= U.

Bug: 252994429
Bug: 242716250
Test: atest FrameworksCoreTests:com.android.internal.os.SafeZipPathValidatorCallbackTest
Change-Id: Idef0f78a9da86d7606681a8fbc3f61b1be99adaf
parent 79605eb9
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment