Skip to content
Snippets Groups Projects
Commit 9d439d3d authored by Stephen Smalley's avatar Stephen Smalley
Browse files

neverallow read to shell- and app-writable symlinks.


To reduce the likelihood of malicious symlink attacks, neverallow
read access to shell- and app-writable symlinks.

Change-Id: I0dea1e6e4f0ce34531100696d230294e1b8a5500
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent e010f08e
No related branches found
No related tags found
No related merge requests found
...@@ -452,3 +452,20 @@ neverallow { ...@@ -452,3 +452,20 @@ neverallow {
-runas -runas
-zygote -zygote
} shell:process { transition dyntransition }; } shell:process { transition dyntransition };
# Minimize read access to shell- or app-writable symlinks.
# This is to prevent malicious symlink attacks.
neverallow {
domain
-appdomain
-installd
-uncrypt # TODO: see if we can remove
} app_data_file:lnk_file read;
neverallow {
domain
-shell
userdebug_or_eng(`-uncrypt')
-installd
-surfaceflinger # TODO: see if we can remove from mako sepolicy
} shell_data_file:lnk_file read;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment