untrusted_app: confine filesystem creation to sandbox
untrusted_apps could be allowed to create/unlink files in world
accessible /data locations. These applications could create
files in a way that would need cap dac_override to remove from
the system when they are uninstalled and/or leave orphaned
data behind.
Keep untrusted_app file creation to sandbox, sdcard and media
locations.
Signed-off-by: William Roberts <william.c.roberts@intel.com>
(cherry picked from commit bd0768cc93
)
Change-Id: Ideb275f696606882d8a5d8fdedb48545a34de887
This commit is contained in:
parent
66855fcaf3
commit
db664c9ed3
1 changed files with 18 additions and 0 deletions
|
@ -154,3 +154,21 @@ neverallow untrusted_app { cache_file cache_recovery_file }:file ~{ read getattr
|
|||
# Do not allow untrusted_app to set system properties.
|
||||
neverallow untrusted_app property_socket:sock_file write;
|
||||
neverallow untrusted_app property_type:property_service set;
|
||||
|
||||
# Do not allow untrusted_app to create/unlink files outside of its sandbox,
|
||||
# internal storage or sdcard.
|
||||
# World accessible data locations allow application to fill the device
|
||||
# with unaccounted for data. This data will not get removed during
|
||||
# application un-installation.
|
||||
neverallow untrusted_app {
|
||||
fs_type
|
||||
-fuse # sdcard
|
||||
file_type
|
||||
-app_data_file # The apps sandbox itself
|
||||
-media_rw_data_file # Internal storage. Known that apps can
|
||||
# leave artfacts here after uninstall.
|
||||
userdebug_or_eng(`
|
||||
-method_trace_data_file # only on ro.debuggable=1
|
||||
-coredump_file # userdebug/eng only
|
||||
')
|
||||
}:dir_file_class_set { create unlink };
|
||||
|
|
Loading…
Reference in a new issue