<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Aosp on Alessandro Sangiorgi — GPU Performance Engineer</title><link>https://contact.alessandrosangiorgi.net/tags/aosp/</link><description>Recent content in Aosp on Alessandro Sangiorgi — GPU Performance Engineer</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 06 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://contact.alessandrosangiorgi.net/tags/aosp/index.xml" rel="self" type="application/rss+xml"/><item><title>Intercepting Android's ManagedProvisioning: A PendingIntent Vulnerability in AOSP</title><link>https://contact.alessandrosangiorgi.net/posts/managedprovisioning-pendingintent-vulnerability/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://contact.alessandrosangiorgi.net/posts/managedprovisioning-pendingintent-vulnerability/</guid><description>&lt;p&gt;I found and reported a vulnerability in Android&amp;rsquo;s &lt;code&gt;ManagedProvisioning&lt;/code&gt; component — the system app responsible for setting up enterprise-managed (work) profiles. The bug allows any unprivileged third-party app to intercept a privileged provisioning callback, leaking install timing, session metadata, and in some cases package details — all without any special permissions.&lt;/p&gt;
&lt;p&gt;Google acknowledged the report, logged it for potential remediation, and classified it as low severity. Here&amp;rsquo;s the full breakdown.&lt;/p&gt;</description></item></channel></rss>