Skip to content

Commit 8628133

Browse files
cgzonesjwcart2
authored andcommitted
libsepol: validate ocontexts
Check the literal contexts in ocontext statements are defined. ==91274==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f60b0afe8c6 bp 0x7ffd42edc990 sp 0x7ffd42edc148 T0) ==91274==The signal is caused by a READ memory access. ==91274==Hint: address points to the zero page. #0 0x7f60b0afe8c6 string/../sysdeps/x86_64/multiarch/../strlen.S:120 #1 0x4bd128 in __interceptor_strlen (./out/binpolicy-fuzzer+0x4bd128) #2 0x5eb387 in create_str_helper ./libsepol/src/kernel_to_common.c:69:10 #3 0x5eb11e in create_str ./libsepol/src/kernel_to_common.c:99:8 #4 0x56ad7b in context_to_str ./libsepol/src/kernel_to_conf.c:2408:9 #5 0x56a717 in write_sid_context_rules_to_conf ./libsepol/src/kernel_to_conf.c:2441:9 #6 0x55b26c in write_selinux_isid_rules_to_conf ./libsepol/src/kernel_to_conf.c:2476:9 #7 0x55b26c in sepol_kernel_policydb_to_conf ./libsepol/src/kernel_to_conf.c:3206:8 #8 0x55a34f in LLVMFuzzerTestOneInput ./libsepol/fuzz/binpolicy-fuzzer.c:38:9 #9 0x45aed3 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) fuzzer.o #10 0x446a12 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) fuzzer.o #11 0x44c93b in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) fuzzer.o #12 0x475dd2 in main (./out/binpolicy-fuzzer+0x475dd2) #13 0x7f60b0a887ec in __libc_start_main csu/../csu/libc-start.c:332:16 #14 0x423689 in _start (./out/binpolicy-fuzzer+0x423689) Signed-off-by: Christian Göttsche <[email protected]>
1 parent 5f81623 commit 8628133

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

libsepol/src/policydb_validate.c

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -736,6 +736,49 @@ static int validate_filename_trans_hashtab(sepol_handle_t *handle, hashtab_t fil
736736
return 0;
737737
}
738738

739+
static int validate_context(context_struct_t *con, validate_t flavors[], int mls)
740+
{
741+
if (validate_value(con->user, &flavors[SYM_USERS]))
742+
return -1;
743+
if (validate_value(con->role, &flavors[SYM_ROLES]))
744+
return -1;
745+
if (validate_value(con->type, &flavors[SYM_TYPES]))
746+
return -1;
747+
if (mls && validate_mls_range(&con->range, &flavors[SYM_LEVELS], &flavors[SYM_CATS]))
748+
return -1;
749+
750+
return 0;
751+
}
752+
753+
static int validate_ocontexts(sepol_handle_t *handle, policydb_t *p, validate_t flavors[])
754+
{
755+
ocontext_t *octx;
756+
unsigned int i;
757+
758+
for (i = 0; i < OCON_NUM; i++) {
759+
for (octx = p->ocontexts[i]; octx; octx = octx->next) {
760+
if (validate_context(&octx->context[0], flavors, p->mls))
761+
goto bad;
762+
763+
if (p->target_platform == SEPOL_TARGET_SELINUX) {
764+
switch (i) {
765+
case OCON_FS:
766+
case OCON_NETIF:
767+
if (validate_context(&octx->context[1], flavors, p->mls))
768+
goto bad;
769+
break;
770+
}
771+
}
772+
}
773+
}
774+
775+
return 0;
776+
777+
bad:
778+
ERR(handle, "Invalid ocontext");
779+
return -1;
780+
}
781+
739782
/*
740783
* Functions to validate a module policydb
741784
*/
@@ -936,6 +979,9 @@ int validate_policydb(sepol_handle_t *handle, policydb_t *p)
936979
goto bad;
937980
}
938981

982+
if (validate_ocontexts(handle, p, flavors))
983+
goto bad;
984+
939985
if (validate_scopes(handle, p->scope, p->global))
940986
goto bad;
941987

0 commit comments

Comments
 (0)