-
Notifications
You must be signed in to change notification settings - Fork 81
Comparing changes
Open a pull request
base repository: LineageOS/android_packages_services_Telecomm
base: lineage-16.0
head repository: lineageos-resurrected/android_packages_services_Telecomm
compare: lineage-16.0
- 10 commits
- 18 files changed
- 6 contributors
Commits on Jul 4, 2024
-
limit TelecomManager#registerPhoneAccount to 10
bug: 209814693 Bug: 217934478 Test: CTS Change-Id: I3042a3973dd0dcc8d2fdc96c23d6d41522dc00af Merged-In: I3042a3973dd0dcc8d2fdc96c23d6d41522dc00af (cherry picked from commit eb3394e) Merged-In: I3042a3973dd0dcc8d2fdc96c23d6d41522dc00af
Thomas Stuart authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 2461ed3 - Browse repository at this point
Copy the full SHA 2461ed3View commit details -
Resolve StatusHints image exploit across user.
Because of the INTERACT_ACROSS_USERS permission, an app that implements a ConnectionService can upload an image icon belonging to another user by setting it in the StatusHints. Validating the construction of the StatusHints on the calling user would prevent a malicious app from registering a connection service with the embedded image icon from a different user. From additional feedback, this CL also addresses potential vulnerabilities in an app being able to directly invoke the binder for a means to manipulate the contents of the bundle that are passed with it. The targeted points of entry are in ConnectionServiceWrapper for the following APIs: handleCreateConnectionComplete, setStatusHints, addConferenceCall, and addExistingConnection. Fixes: 280797684 Test: Manual (verified that original exploit is no longer an issue). Test: Unit test for validating image in StatusHints constructor. Test: Unit tests to address vulnerabilities via the binder. (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:49d19dd265bee669b230efa29bf98c83650efea6) Merged-In: Ie1f6a8866d31d5f1099dd0630cf8e9ee782d389c Change-Id: Ie1f6a8866d31d5f1099dd0630cf8e9ee782d389c
Pranav Madapurmath authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 5b5cb7c - Browse repository at this point
Copy the full SHA 5b5cb7cView commit details -
Fix security vulnerability when register phone accounts.
Currently if the registered self-managed phone account updated to a call provider phone account, the enable state will be directly copied to the updated one so that malicious app can perform call spoofing attack without any permission requirements. Fix this by disallowing change a self-managed phone account to a managed phone account. Bug: 246930197 Test: CtsTelecomTestCases:SelfManagedConnectionSreviceTest Change-Id: I8f7984cd491632b3219133044438b82ca4dec80e Merged-In: I8f7984cd491632b3219133044438b82ca4dec80e (cherry picked from commit 833dd84) Merged-In: I8f7984cd491632b3219133044438b82ca4dec80e
Grace Jia authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 426a30c - Browse repository at this point
Copy the full SHA 426a30cView commit details -
switch TelecomManager List getters to ParceledListSlice
It was shown that given a large phoneAccountHandles that are over 1 mb, a TransactionTooLarge exception can be silently thrown causing an empty list to be returned. In order to prevent this behavior, all Lists that return a PhoneAccountHandle or PhoneAccount have been switched to ParceledListSlice. bug: 236263294 Test: atest android.telecom.cts.PhoneAccountRegistrarTest #testRegisterPhoneAccountHandleWithFieldOverLimit Change-Id: Ibc3814dabd59cf9f0f9505b88f2146a4c3c5e015 Merged-In: Ibc3814dabd59cf9f0f9505b88f2146a4c3c5e015 (cherry picked from commit 960147d) Merged-In: Ibc3814dabd59cf9f0f9505b88f2146a4c3c5e015
Thomas Stuart authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 020e747 - Browse repository at this point
Copy the full SHA 020e747View commit details -
Handle null bindings returned from ConnectionService.
When a ConnectionService returns a null binding, immediately unbind from the ConnectionService and cancel any ongoing calls related to it. Bug: 211114016 Test: Added new CTS test to verify auto unbind from null binding ConnectionService. Test: Manually tested using test app which implements null binding ConnectionService and verified via telecom log inspection that the service is unbound and the call is terminated. Change-Id: I0757557e66725dddfd871cd9857071a8749bd7ba (cherry picked from commit 410ce02) Merged-In: I0757557e66725dddfd871cd9857071a8749bd7ba
Tyler Gunn authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 77128e0 - Browse repository at this point
Copy the full SHA 77128e0View commit details -
Hide overlay windows when showing phone account enable/disable screen.
Hide any system alert window overlays when the screen that lets the user enable/disable phone accounts is shown. Test: Manual test with overlay shown from test app; verify that the overlay is hidden when the phone account selection screen is opened. Bug: 246933359 Change-Id: Ia0209d57ee9a672cde4196076845d77941dc3f68 (cherry picked from commit a7d57ac) Merged-In: Ia0209d57ee9a672cde4196076845d77941dc3f68
Tyler Gunn authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for b8ef463 - Browse repository at this point
Copy the full SHA b8ef463View commit details -
enforce stricter rules when registering phoneAccounts
- include disable accounts when looking up accounts for a package to check if the limit is reached (10) - put a new limit of 10 supported schemes - put a new limit of 256 characters per scheme - put a new limit of 256 characters per address - ensure the Icon can write to memory w/o an exception bug: 259064622 bug: 256819769 Test: cts + unit Change-Id: I5eb2a127a44d5ec725d0ba39cb0ef478b12013de Merged-In: I5eb2a127a44d5ec725d0ba39cb0ef478b12013de (cherry picked from commit on googleplex-android-review.googlesource.com host: 56ef9e1) Merged-In: I5eb2a127a44d5ec725d0ba39cb0ef478b12013de
Thomas Stuart authored and Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 02a57b2 - Browse repository at this point
Copy the full SHA 02a57b2View commit details -
Resolve account image icon profile boundary exploit.
Because Telecom grants the INTERACT_ACROSS_USERS permission, an exploit is possible where the user can upload an image icon (belonging to another user) via registering a phone account. This CL provides a lightweight solution for parsing the image URI to detect profile exploitation. Fixes: 273502295 | AOSP Fixes: 296915211 | AOSP Test: Unit test to enforce successful/failure path (cherry picked from commit d0d1d38 | AOSP) (cherry picked from commit e7d0ca3 | AOSP) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:a604311f86ea8136ca2ac9f9ff0af7fa57ee3f42) Merged-In: I2b6418f019a373ee9f02ba8683e5b694e7ab80a5 | AOSP Change-Id: I2b6418f019a373ee9f02ba8683e5b694e7ab80a5 | AOSP
Ella committedJul 4, 2024 Configuration menu - View commit details
-
Copy full SHA for 9d25470 - Browse repository at this point
Copy the full SHA 9d25470View commit details
Commits on Nov 27, 2024
-
DO NOT MERGE Unbind CS if connection is not created within 15 seconds.
This CL adds a check to ensure that connection creation occurs within 15 seconds after binding to that ConnectionService. If the connection/conference is not created in that timespan, this CL adds logic to manually unbind the ConnectionService at that point in time. This prevents malicious apps from keeping a declared permission in forever even in the background. Bug: 293458004 Test: manually using the provided apk + atest CallsManagerTest Flag: EXEMPT Security High/Critical Severity CVE (cherry picked from commit 7aa55ff) (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:286781dfcb78d8b5c1a77f2390f5251f01943add) Merged-In: I30caed1481dff5af2223a8ff589846597cee8229 Change-Id: I30caed1481dff5af2223a8ff589846597cee8229
Configuration menu - View commit details
-
Copy full SHA for fc4393f - Browse repository at this point
Copy the full SHA fc4393fView commit details
Commits on Mar 17, 2025
-
Resolve cross account user icon validation.
Resolves a vulnerability found with the cross account user icon validation in StatusHint and TelecomServiceImpl (when registering a phone account). The reporter found that an uri formatted as `userId%` isn't parsed properly with the existing reference to Uri.encodedUserInfo. Bug: 376461551 Bug: 376259166 Flag: EXEMPT bugfix Test: atest TelecomServiceImplTest (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:4c046b179d4bdffa6d35f9637b0f4cc359a67451) Merged-In: I7a5f64ae01eaf6a133ea04c51bd00dbe1653b74f Change-Id: I7a5f64ae01eaf6a133ea04c51bd00dbe1653b74f
Configuration menu - View commit details
-
Copy full SHA for fcac1ac - Browse repository at this point
Copy the full SHA fcac1acView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff lineage-16.0...lineage-16.0