Blame SOURCES/0002-Verify-context-input-to-funtions-to-make-sure-the-co.patch

84659d
From ad3d3a0bf819f5895a6884357c2d0e18ea1ef314 Mon Sep 17 00:00:00 2001
84659d
From: Dan Walsh <dwalsh@redhat.com>
84659d
Date: Mon, 23 Dec 2013 09:50:54 -0500
ccae17
Subject: [PATCH] Verify context input to funtions to make sure the context
84659d
 field is not null.
84659d
84659d
Return errno EINVAL, to prevent segfault.
84659d
84659d
Rejected by upstream https://marc.info/?l=selinux&m=145036088424584&w=2
84659d
84659d
FIXME: use __attribute__(nonnull (arg-index, ...))
84659d
---
84659d
 libselinux/src/avc_sidtab.c           | 5 +++++
84659d
 libselinux/src/canonicalize_context.c | 5 +++++
84659d
 libselinux/src/check_context.c        | 5 +++++
84659d
 libselinux/src/compute_av.c           | 5 +++++
84659d
 libselinux/src/compute_create.c       | 5 +++++
84659d
 libselinux/src/compute_member.c       | 5 +++++
84659d
 libselinux/src/compute_relabel.c      | 5 +++++
84659d
 libselinux/src/compute_user.c         | 5 +++++
84659d
 libselinux/src/fsetfilecon.c          | 8 ++++++--
84659d
 libselinux/src/lsetfilecon.c          | 9 +++++++--
84659d
 libselinux/src/setfilecon.c           | 8 ++++++--
84659d
 11 files changed, 59 insertions(+), 6 deletions(-)
84659d
84659d
diff --git a/libselinux/src/avc_sidtab.c b/libselinux/src/avc_sidtab.c
84659d
index 9669264d..c7754305 100644
84659d
--- a/libselinux/src/avc_sidtab.c
84659d
+++ b/libselinux/src/avc_sidtab.c
84659d
@@ -81,6 +81,11 @@ sidtab_context_to_sid(struct sidtab *s,
84659d
 	int hvalue, rc = 0;
84659d
 	struct sidtab_node *cur;
84659d
 
84659d
+	if (! ctx) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	*sid = NULL;
84659d
 	hvalue = sidtab_hash(ctx);
84659d
 
84659d
diff --git a/libselinux/src/canonicalize_context.c b/libselinux/src/canonicalize_context.c
84659d
index ba4c9a2c..c8158725 100644
84659d
--- a/libselinux/src/canonicalize_context.c
84659d
+++ b/libselinux/src/canonicalize_context.c
84659d
@@ -17,6 +17,11 @@ int security_canonicalize_context_raw(const char * con,
84659d
 	size_t size;
84659d
 	int fd, ret;
84659d
 
84659d
+	if (! con) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	if (!selinux_mnt) {
84659d
 		errno = ENOENT;
84659d
 		return -1;
84659d
diff --git a/libselinux/src/check_context.c b/libselinux/src/check_context.c
84659d
index 8a7997f0..5be84348 100644
84659d
--- a/libselinux/src/check_context.c
84659d
+++ b/libselinux/src/check_context.c
84659d
@@ -14,6 +14,11 @@ int security_check_context_raw(const char * con)
84659d
 	char path[PATH_MAX];
84659d
 	int fd, ret;
84659d
 
84659d
+	if (! con) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	if (!selinux_mnt) {
84659d
 		errno = ENOENT;
84659d
 		return -1;
84659d
diff --git a/libselinux/src/compute_av.c b/libselinux/src/compute_av.c
84659d
index a47cffe9..6d285a2e 100644
84659d
--- a/libselinux/src/compute_av.c
84659d
+++ b/libselinux/src/compute_av.c
84659d
@@ -27,6 +27,11 @@ int security_compute_av_flags_raw(const char * scon,
84659d
 		return -1;
84659d
 	}
84659d
 
84659d
+	if ((! scon) || (! tcon)) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	snprintf(path, sizeof path, "%s/access", selinux_mnt);
84659d
 	fd = open(path, O_RDWR | O_CLOEXEC);
84659d
 	if (fd < 0)
84659d
diff --git a/libselinux/src/compute_create.c b/libselinux/src/compute_create.c
84659d
index 0975aeac..3e6a48c1 100644
84659d
--- a/libselinux/src/compute_create.c
84659d
+++ b/libselinux/src/compute_create.c
84659d
@@ -64,6 +64,11 @@ int security_compute_create_name_raw(const char * scon,
84659d
 		return -1;
84659d
 	}
84659d
 
84659d
+	if ((! scon) || (! tcon)) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	snprintf(path, sizeof path, "%s/create", selinux_mnt);
84659d
 	fd = open(path, O_RDWR | O_CLOEXEC);
84659d
 	if (fd < 0)
84659d
diff --git a/libselinux/src/compute_member.c b/libselinux/src/compute_member.c
84659d
index 4e2d221e..d1dd9772 100644
84659d
--- a/libselinux/src/compute_member.c
84659d
+++ b/libselinux/src/compute_member.c
84659d
@@ -25,6 +25,11 @@ int security_compute_member_raw(const char * scon,
84659d
 		return -1;
84659d
 	}
84659d
 
84659d
+	if ((! scon) || (! tcon)) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	snprintf(path, sizeof path, "%s/member", selinux_mnt);
84659d
 	fd = open(path, O_RDWR | O_CLOEXEC);
84659d
 	if (fd < 0)
84659d
diff --git a/libselinux/src/compute_relabel.c b/libselinux/src/compute_relabel.c
84659d
index 49f77ef3..c3db7c0a 100644
84659d
--- a/libselinux/src/compute_relabel.c
84659d
+++ b/libselinux/src/compute_relabel.c
84659d
@@ -25,6 +25,11 @@ int security_compute_relabel_raw(const char * scon,
84659d
 		return -1;
84659d
 	}
84659d
 
84659d
+	if ((! scon) || (! tcon)) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	snprintf(path, sizeof path, "%s/relabel", selinux_mnt);
84659d
 	fd = open(path, O_RDWR | O_CLOEXEC);
84659d
 	if (fd < 0)
84659d
diff --git a/libselinux/src/compute_user.c b/libselinux/src/compute_user.c
84659d
index 7b881215..401fd107 100644
84659d
--- a/libselinux/src/compute_user.c
84659d
+++ b/libselinux/src/compute_user.c
84659d
@@ -24,6 +24,11 @@ int security_compute_user_raw(const char * scon,
84659d
 		return -1;
84659d
 	}
84659d
 
84659d
+	if (! scon) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
 	snprintf(path, sizeof path, "%s/user", selinux_mnt);
84659d
 	fd = open(path, O_RDWR | O_CLOEXEC);
84659d
 	if (fd < 0)
84659d
diff --git a/libselinux/src/fsetfilecon.c b/libselinux/src/fsetfilecon.c
84659d
index 52707d05..0cbe12d8 100644
84659d
--- a/libselinux/src/fsetfilecon.c
84659d
+++ b/libselinux/src/fsetfilecon.c
84659d
@@ -9,8 +9,12 @@
84659d
 
84659d
 int fsetfilecon_raw(int fd, const char * context)
84659d
 {
84659d
-	int rc = fsetxattr(fd, XATTR_NAME_SELINUX, context, strlen(context) + 1,
84659d
-			 0);
84659d
+	int rc;
84659d
+	if (! context) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+	rc = fsetxattr(fd, XATTR_NAME_SELINUX, context, strlen(context) + 1, 0);
84659d
 	if (rc < 0 && errno == ENOTSUP) {
84659d
 		char * ccontext = NULL;
84659d
 		int err = errno;
84659d
diff --git a/libselinux/src/lsetfilecon.c b/libselinux/src/lsetfilecon.c
84659d
index 1d3b28a1..ea6d70b7 100644
84659d
--- a/libselinux/src/lsetfilecon.c
84659d
+++ b/libselinux/src/lsetfilecon.c
84659d
@@ -9,8 +9,13 @@
84659d
 
84659d
 int lsetfilecon_raw(const char *path, const char * context)
84659d
 {
84659d
-	int rc = lsetxattr(path, XATTR_NAME_SELINUX, context, strlen(context) + 1,
84659d
-			 0);
84659d
+	int rc;
84659d
+	if (! context) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+
84659d
+	rc = lsetxattr(path, XATTR_NAME_SELINUX, context, strlen(context) + 1, 0);
84659d
 	if (rc < 0 && errno == ENOTSUP) {
84659d
 		char * ccontext = NULL;
84659d
 		int err = errno;
84659d
diff --git a/libselinux/src/setfilecon.c b/libselinux/src/setfilecon.c
84659d
index d05969c6..3f0200e8 100644
84659d
--- a/libselinux/src/setfilecon.c
84659d
+++ b/libselinux/src/setfilecon.c
84659d
@@ -9,8 +9,12 @@
84659d
 
84659d
 int setfilecon_raw(const char *path, const char * context)
84659d
 {
84659d
-	int rc = setxattr(path, XATTR_NAME_SELINUX, context, strlen(context) + 1,
84659d
-			0);
84659d
+	int rc;
84659d
+	if (! context) {
84659d
+		errno=EINVAL;
84659d
+		return -1;
84659d
+	}
84659d
+	rc = setxattr(path, XATTR_NAME_SELINUX, context, strlen(context) + 1, 0);
84659d
 	if (rc < 0 && errno == ENOTSUP) {
84659d
 		char * ccontext = NULL;
84659d
 		int err = errno;
84659d
-- 
84659d
2.21.0
84659d