Skip to content
Snippets Groups Projects
Commit 3fa5d73b authored by Nick Kralevich's avatar Nick Kralevich Committed by Android Git Automerger
Browse files

am 642b8042: relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets

* commit '642b8042':
  relax neverallow rules on NETLINK_KOBJECT_UEVENT sockets
parents 241c1c41 642b8042
No related branches found
No related tags found
No related merge requests found
...@@ -219,9 +219,13 @@ neverallow appdomain ...@@ -219,9 +219,13 @@ neverallow appdomain
netlink_audit_socket netlink_audit_socket
netlink_ip6fw_socket netlink_ip6fw_socket
netlink_dnrt_socket netlink_dnrt_socket
netlink_kobject_uevent_socket
} *; } *;
# These messages are broadcast messages from the kernel to userspace.
# Do not allow the writing of netlink messages, which has been a source
# of rooting vulns in the past.
neverallow appdomain self:netlink_kobject_uevent_socket { write append };
# Sockets under /dev/socket that are not specifically typed. # Sockets under /dev/socket that are not specifically typed.
neverallow appdomain socket_device:sock_file write; neverallow appdomain socket_device:sock_file write;
......
...@@ -81,6 +81,9 @@ auditallow untrusted_app { ...@@ -81,6 +81,9 @@ auditallow untrusted_app {
### neverallow rules ### neverallow rules
### ###
# Receive or send uevent messages.
neverallow untrusted_app self:netlink_kobject_uevent_socket *;
# Too much leaky information in debugfs. It's a security # Too much leaky information in debugfs. It's a security
# best practice to ensure these files aren't readable. # best practice to ensure these files aren't readable.
neverallow untrusted_app debugfs:file read; neverallow untrusted_app debugfs:file read;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment