Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

public

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Max Bires authored
    This neverallow addition addresses the renaming of files in exploits in
    order to bypass denied permissions. An example of a similar use case of
    using mv to bypass permission denials appeared in a recent project zero
    ChromeOS exploit as one of the steps in the exploit chain.
    https://googleprojectzero.blogspot.com/2016/12/chrome-os-exploit-one-byte-overflow-and.html
    
    Additionally, vold and init both had permission sets that allowed them
    to rename, but neither of them seem to need it. Therefore the rename
    permission has also been removed from these two .te files.
    
    Test: The device boots successfully
    Change-Id: I07bbb58f058bf050f269b083e836c2c9a5bbad80
    626f90c5
    History
    Name Last commit Last update
    ..