Skip to content
Snippets Groups Projects
Commit 581e6c47 authored by Treehugger Robot's avatar Treehugger Robot Committed by Gerrit Code Review
Browse files

Merge "Enforce execve() restrictions for API > 28"

parents a94e6e51 0dd738d8
No related branches found
No related tags found
No related merge requests found
...@@ -40,6 +40,16 @@ neverallow { all_untrusted_apps -mediaprovider } property_type:property_service ...@@ -40,6 +40,16 @@ neverallow { all_untrusted_apps -mediaprovider } property_type:property_service
# but otherwise disallow untrusted apps from reading this property. # but otherwise disallow untrusted apps from reading this property.
neverallow { all_untrusted_apps -untrusted_app_25 } net_dns_prop:file read; neverallow { all_untrusted_apps -untrusted_app_25 } net_dns_prop:file read;
# Block calling execve() on files in an apps home directory.
# This is a W^X violation (loading executable code from a writable
# home directory). For compatibility, allow for targetApi <= 28.
# b/112357170
neverallow {
all_untrusted_apps
-untrusted_app_25
-untrusted_app_27
} { app_data_file privapp_data_file }:file execute_no_trans;
# Do not allow untrusted apps to be assigned mlstrustedsubject. # Do not allow untrusted apps to be assigned mlstrustedsubject.
# This would undermine the per-user isolation model being # This would undermine the per-user isolation model being
# enforced via levelFrom=user in seapp_contexts and the mls # enforced via levelFrom=user in seapp_contexts and the mls
......
...@@ -113,6 +113,7 @@ user=_app seinfo=media domain=mediaprovider name=android.process.media type=app_ ...@@ -113,6 +113,7 @@ user=_app seinfo=media domain=mediaprovider name=android.process.media type=app_
user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user user=_app seinfo=platform domain=platform_app type=app_data_file levelFrom=user
user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all user=_app isV2App=true isEphemeralApp=true domain=ephemeral_app type=app_data_file levelFrom=all
user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user user=_app isPrivApp=true domain=priv_app type=privapp_data_file levelFrom=user
user=_app minTargetSdkVersion=28 domain=untrusted_app type=app_data_file levelFrom=all user=_app minTargetSdkVersion=29 domain=untrusted_app type=app_data_file levelFrom=all
user=_app minTargetSdkVersion=28 domain=untrusted_app_27 type=app_data_file levelFrom=all
user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user user=_app minTargetSdkVersion=26 domain=untrusted_app_27 type=app_data_file levelFrom=user
user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user user=_app domain=untrusted_app_25 type=app_data_file levelFrom=user
...@@ -44,3 +44,8 @@ allow untrusted_app_25 proc_tty_drivers:file r_file_perms; ...@@ -44,3 +44,8 @@ allow untrusted_app_25 proc_tty_drivers:file r_file_perms;
# Text relocation support for API < 23 # Text relocation support for API < 23
# https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23 # https://android.googlesource.com/platform/bionic/+/master/android-changes-for-ndk-developers.md#text-relocations-enforced-for-api-level-23
allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod; allow untrusted_app_25 { apk_data_file app_data_file asec_public_file }:file execmod;
# The ability to call exec() on files in the apps home directories
# for targetApi<=25. This is also allowed for targetAPIs 26, 27,
# and 28 in untrusted_app_27.te.
allow untrusted_app_25 app_data_file:file execute_no_trans;
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
### Untrusted_27. ### Untrusted_27.
### ###
### This file defines the rules for untrusted apps running with ### This file defines the rules for untrusted apps running with
### 25 < targetSdkVersion <= 27. ### 25 < targetSdkVersion <= 28.
### ###
### This file defines the rules for untrusted apps. ### This file defines the rules for untrusted apps.
### Apps are labeled based on mac_permissions.xml (maps signer and ### Apps are labeled based on mac_permissions.xml (maps signer and
...@@ -26,3 +26,7 @@ app_domain(untrusted_app_27) ...@@ -26,3 +26,7 @@ app_domain(untrusted_app_27)
untrusted_app_domain(untrusted_app_27) untrusted_app_domain(untrusted_app_27)
net_domain(untrusted_app_27) net_domain(untrusted_app_27)
bluetooth_domain(untrusted_app_27) bluetooth_domain(untrusted_app_27)
# The ability to call exec() on files in the apps home directories
# for targetApi 26, 27, and 28.
allow untrusted_app_27 app_data_file:file execute_no_trans;
...@@ -22,7 +22,7 @@ ...@@ -22,7 +22,7 @@
# Some apps ship with shared libraries and binaries that they write out # Some apps ship with shared libraries and binaries that they write out
# to their sandbox directory and then execute. # to their sandbox directory and then execute.
allow untrusted_app_all { app_data_file privapp_data_file }:file { rx_file_perms }; allow untrusted_app_all { app_data_file privapp_data_file }:file { r_file_perms execute };
# ASEC # ASEC
allow untrusted_app_all asec_apk_file:file r_file_perms; allow untrusted_app_all asec_apk_file:file r_file_perms;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment