33 lines
1.5 KiB
XML
33 lines
1.5 KiB
XML
<?xml version="1.0" encoding="utf-8"?>
|
|
<!--
|
|
Copyright 2022 The Android Open Source Project
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
-->
|
|
|
|
<resources>
|
|
<string name="filePath">Android/data/CVE-2021-39795-dir/</string>
|
|
<string name="fileContent">Bypassed by MediaProvider</string>
|
|
<string name="fileName">CVE-2021-39795-file</string>
|
|
<string name="external">external</string>
|
|
<string name="secondFixFailure">Second Fix Patch not applied.
|
|
Please Apply second Fix Patch!!</string>
|
|
<string name="fileUtilPkg">com.android.providers.media.util.FileUtils</string>
|
|
<string name="isDataOrObbPathMethod">isDataOrObbPath</string>
|
|
<string name="mediaProviderPkg">com.android.providers.media.module</string>
|
|
<string name="sampleFilePath">/storage/emulated/0/Android/data/foo</string>
|
|
<string name="failure">Device vulnerable to b/201667614! Any app with
|
|
MANAGE_EXTERNAL_STORAGE permission can write into other apps private
|
|
external directory.</string>
|
|
</resources>
|