mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-25 07:29:24 -05:00
082bc48c32
https://review.lineageos.org/q/topic:P_asb_2022-05 https://review.lineageos.org/q/topic:P_asb_2022-06 https://review.lineageos.org/q/topic:P_asb_2022-07 https://review.lineageos.org/q/topic:P_asb_2022-08 https://review.lineageos.org/q/topic:P_asb_2022-09 https://review.lineageos.org/q/topic:P_asb_2022-10 https://review.lineageos.org/q/topic:P_asb_2022-11 https://review.lineageos.org/q/topic:P_asb_2022-12 https://review.lineageos.org/q/topic:P_asb_2023-01 https://review.lineageos.org/q/topic:P_asb_2023-02 https://review.lineageos.org/q/topic:P_asb_2023-03 https://review.lineageos.org/q/topic:P_asb_2023-04 https://review.lineageos.org/q/topic:P_asb_2023-05 https://review.lineageos.org/q/topic:P_asb_2023-06 https://review.lineageos.org/q/topic:P_asb_2023-07 accounted for via manifest change: https://review.lineageos.org/c/LineageOS/android_external_freetype/+/361250 https://review.lineageos.org/q/topic:P_asb_2023-08 accounted for via manifest change: https://review.lineageos.org/c/LineageOS/android_external_freetype/+/364606 accounted for via patches: https://review.lineageos.org/c/LineageOS/android_system_ca-certificates/+/365328 https://review.lineageos.org/q/topic:P_asb_2023-09 https://review.lineageos.org/q/topic:P_asb_2023-10 https://review.lineageos.org/q/topic:P_asb_2023-11 accounted for via patches: https://review.lineageos.org/c/LineageOS/android_system_ca-certificates/+/374916 https://review.lineageos.org/q/topic:P_asb_2023-12 https://review.lineageos.org/q/topic:P_asb_2024-01 https://review.lineageos.org/q/topic:P_asb_2024-02 https://review.lineageos.org/q/topic:P_asb_2024-03 https://review.lineageos.org/q/topic:P_asb_2024-04 Signed-off-by: Tavi <tavi@divested.dev>
107 lines
4.6 KiB
Diff
107 lines
4.6 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Oli Lan <olilan@google.com>
|
|
Date: Fri, 19 Aug 2022 17:08:13 +0100
|
|
Subject: [PATCH] Validate package name passed to setApplicationRestrictions.
|
|
|
|
This adds validation that the package name passed to
|
|
setApplicationRestrictions is in the correct format. This will avoid
|
|
an issue where a path could be entered resulting in a file being
|
|
written to an unexpected place.
|
|
|
|
Bug: 239701237
|
|
Test: atest UserManagerServiceTest
|
|
Change-Id: I1ab2b7228470f10ec26fe3a608ae540cfc9e9a96
|
|
(cherry picked from commit 31a582490d6e8952d24f267df47d669e3861cf67)
|
|
Merged-In: I1ab2b7228470f10ec26fe3a608ae540cfc9e9a96
|
|
(cherry picked from commit cfcfe6ca8c545f78603c05e23687f8638fd4b51d)
|
|
Merged-In: I1ab2b7228470f10ec26fe3a608ae540cfc9e9a96
|
|
---
|
|
.../android/server/pm/UserManagerService.java | 41 +++++++++++++++++++
|
|
.../server/pm/UserManagerServiceTest.java | 7 ++++
|
|
2 files changed, 48 insertions(+)
|
|
|
|
diff --git a/services/core/java/com/android/server/pm/UserManagerService.java b/services/core/java/com/android/server/pm/UserManagerService.java
|
|
index 56d737d50fbf..423b88388809 100644
|
|
--- a/services/core/java/com/android/server/pm/UserManagerService.java
|
|
+++ b/services/core/java/com/android/server/pm/UserManagerService.java
|
|
@@ -76,6 +76,7 @@ import android.provider.Settings;
|
|
import android.security.GateKeeper;
|
|
import android.service.gatekeeper.IGateKeeperService;
|
|
import android.util.AtomicFile;
|
|
+import android.util.EventLog;
|
|
import android.util.IntArray;
|
|
import android.util.Log;
|
|
import android.util.Slog;
|
|
@@ -3104,6 +3105,13 @@ public class UserManagerService extends IUserManager.Stub {
|
|
public void setApplicationRestrictions(String packageName, Bundle restrictions,
|
|
int userId) {
|
|
checkSystemOrRoot("set application restrictions");
|
|
+ String validationResult = validateName(packageName);
|
|
+ if (validationResult != null) {
|
|
+ if (packageName.contains("../")) {
|
|
+ EventLog.writeEvent(0x534e4554, "239701237", -1, "");
|
|
+ }
|
|
+ throw new IllegalArgumentException("Invalid package name: " + validationResult);
|
|
+ }
|
|
if (restrictions != null) {
|
|
restrictions.setDefusable(true);
|
|
}
|
|
@@ -3123,6 +3131,39 @@ public class UserManagerService extends IUserManager.Stub {
|
|
mContext.sendBroadcastAsUser(changeIntent, UserHandle.of(userId));
|
|
}
|
|
|
|
+ /**
|
|
+ * Check if the given name is valid.
|
|
+ *
|
|
+ * Note: the logic is taken from FrameworkParsingPackageUtils in master, edited to remove
|
|
+ * unnecessary parts. Copied here for a security fix.
|
|
+ *
|
|
+ * @param name The name to check.
|
|
+ * @return null if it's valid, error message if not
|
|
+ */
|
|
+ @VisibleForTesting
|
|
+ static String validateName(String name) {
|
|
+ final int n = name.length();
|
|
+ boolean front = true;
|
|
+ for (int i = 0; i < n; i++) {
|
|
+ final char c = name.charAt(i);
|
|
+ if ((c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z')) {
|
|
+ front = false;
|
|
+ continue;
|
|
+ }
|
|
+ if (!front) {
|
|
+ if ((c >= '0' && c <= '9') || c == '_') {
|
|
+ continue;
|
|
+ }
|
|
+ if (c == '.') {
|
|
+ front = true;
|
|
+ continue;
|
|
+ }
|
|
+ }
|
|
+ return "bad character '" + c + "'";
|
|
+ }
|
|
+ return null;
|
|
+ }
|
|
+
|
|
private int getUidForPackage(String packageName) {
|
|
long ident = Binder.clearCallingIdentity();
|
|
try {
|
|
diff --git a/services/tests/servicestests/src/com/android/server/pm/UserManagerServiceTest.java b/services/tests/servicestests/src/com/android/server/pm/UserManagerServiceTest.java
|
|
index d1366144d33b..8da7a76f18ce 100644
|
|
--- a/services/tests/servicestests/src/com/android/server/pm/UserManagerServiceTest.java
|
|
+++ b/services/tests/servicestests/src/com/android/server/pm/UserManagerServiceTest.java
|
|
@@ -74,6 +74,13 @@ public class UserManagerServiceTest extends AndroidTestCase {
|
|
assertEquals(accountName, um.getUserAccount(tempUserId));
|
|
}
|
|
|
|
+ public void testValidateName() {
|
|
+ assertNull(UserManagerService.validateName("android"));
|
|
+ assertNull(UserManagerService.validateName("com.company.myapp"));
|
|
+ assertNotNull(UserManagerService.validateName("/../../data"));
|
|
+ assertNotNull(UserManagerService.validateName("/dir"));
|
|
+ }
|
|
+
|
|
private Bundle createBundle() {
|
|
Bundle result = new Bundle();
|
|
// Tests for 6 allowed types: Integer, Boolean, String, String[], Bundle and Parcelable[]
|