summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJeff Sharkey <jsharkey@android.com>2016-02-16 16:08:21 -0700
committerThe Android Automerger <android-build@google.com>2016-02-26 15:08:42 -0800
commit6ef6fb9c095332722e4bfee15ad5e2f6fc80e636 (patch)
tree1271d0a2d3c5754202130cf4880098dbcb3a2414
parenta8bc340abfcde516e563de5ff800ccb683928ad4 (diff)
downloadandroid_packages_providers_DownloadProvider-6ef6fb9c095332722e4bfee15ad5e2f6fc80e636.tar.gz
android_packages_providers_DownloadProvider-6ef6fb9c095332722e4bfee15ad5e2f6fc80e636.tar.bz2
android_packages_providers_DownloadProvider-6ef6fb9c095332722e4bfee15ad5e2f6fc80e636.zip
DO NOT MERGE. Use resolved path when inserting and deleting.
This avoids a race condition where someone can change a symlink target after the security checks have passed. Bug: 26211054 Change-Id: Ia58425ab71c1472dd2f2dd31dae000ca29d0bcb2
-rw-r--r--src/com/android/providers/downloads/DownloadProvider.java20
1 files changed, 15 insertions, 5 deletions
diff --git a/src/com/android/providers/downloads/DownloadProvider.java b/src/com/android/providers/downloads/DownloadProvider.java
index 620085fc..d9acc789 100644
--- a/src/com/android/providers/downloads/DownloadProvider.java
+++ b/src/com/android/providers/downloads/DownloadProvider.java
@@ -715,7 +715,13 @@ public final class DownloadProvider extends ContentProvider {
throw new IllegalArgumentException("Invalid file URI: " + uri);
}
- final File file = new File(path);
+ final File file;
+ try {
+ file = new File(path).getCanonicalFile();
+ } catch (IOException e) {
+ throw new SecurityException(e);
+ }
+
if (Helpers.isFilenameValidInExternalPackage(getContext(), file, getCallingPackage())) {
// No permissions required for paths belonging to calling package
return;
@@ -1191,10 +1197,14 @@ public final class DownloadProvider extends ContentProvider {
final String path = cursor.getString(1);
if (!TextUtils.isEmpty(path)) {
- final File file = new File(path);
- if (Helpers.isFilenameValid(getContext(), file)) {
- Log.v(Constants.TAG, "Deleting " + file + " via provider delete");
- file.delete();
+ try {
+ final File file = new File(path).getCanonicalFile();
+ if (Helpers.isFilenameValid(getContext(), file)) {
+ Log.v(Constants.TAG,
+ "Deleting " + file + " via provider delete");
+ file.delete();
+ }
+ } catch (IOException ignored) {
}
}
}