From b18eb119aa73ee9e0e77aea4d1a8fd3092ea017a Mon Sep 17 00:00:00 2001 From: Daniel Micay Date: Thu, 2 Feb 2023 01:03:43 -0500 Subject: [PATCH] add further details about the release --- static/releases.html | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/static/releases.html b/static/releases.html index 50e8805d..401008cd 100644 --- a/static/releases.html +++ b/static/releases.html @@ -664,6 +664,40 @@
  • TQ1A.230105.002.2023012500 (Pixel 6, Pixel 6 Pro, Pixel 7 Pro, emulator, generic, other targets)
  • +

    This release fixes major weaknesses in Android's verified boot. Android has + working protecting of the firmware images, OS images and out-of-band updates + to APEX components through verified boot and provides verification for every + read of the data rather than actually only verifying at boot. Firmware and + core OS images are fully read and verified before use. High level OS images + and out-of-band APEX updates are verified dynamically when data is read via + dm-verity. Unfortunately, Android doesn't have anywhere near complete/correct + verification of non-APEX APK-based components including many privileged OS + components implemented as apps and the apps bundled with the OS. GrapheneOS + now provides an implementation of this verification to extend verified boot + and hardware-based attestation to these components correctly. We previously + enhanced the downgrade protection check for system updates to require a + greater version rather than equal or greater due to most Android OS components + not having their versionCode consistently increased when they're changed, and + this is now integrated into our new verification. At the moment, we enforce + verification for APK-based components at boot. We already provide fs-verity + metadata for continuous verification of all the out-of-band updates we ship + and we require it to be provided for system update installation, but we need + to phase in enforcing it at boot time in a way that won't cause system app + updates to be rolled back for users upgrading from older OS releases where + they updated to newer system app versions than the ones bundled in the new OS + update.

    + +

    This release also supports out-of-band updates for Vanadium going forward + due to replacing incompatible SELinux hardening with these far superior + verified boot improvements along with fixing a major upstream Android 13 + regression in the original-package feature causing out-of-band updates to + system apps using this feature to be rolled back on reboot. Vanadium used + original-package to rename the browser app from org.chromium.chrome to + app.vanadium.browser so it still uses the org.chromium.chrome app id for + compatibility on older installs (factory reset counts as a fresh install). + Both app ids will be able to receive out-of-band updates due to our bug + fix.

    +

    Changes since the 2023012500 release: