Re: ANN: SELinux userspace 2.8-rc1 release candidate

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 20, 2018 at 08:49:41AM -0400, Stephen Smalley wrote:
> On 04/20/2018 08:31 AM, Petr Lautrbach wrote:
> > On Thu, Apr 19, 2018 at 11:07:39AM -0400, Stephen Smalley wrote:
> >> A 2.8-rc1 release candidate for the SELinux userspace is now available at:
> >> https://github.com/SELinuxProject/selinux/wiki/Releases
> >>
> >> Please give it a test and let us know if there are any issues.
> > 
> > 
> > I've built in my Fedora COPR repo [1] and I'm running Fedora CI [2] tests on it. 
> > 
> > So far there's one problem found by libselinux/selabel-function [3] test. It
> > looks like commit 814631d3aebaa changed the behavior of selabel_open() when
> > SELABEL_OPT_VALIDATE is null - a context should not be validated, but it is.
> 
> So, is this a bug in the test or a bug in libselinux?  As noted in that commit description,
> failing to verify contexts at all before use can lead to applying an invalid label (if the system is permissive).

selabel_open(3) states that "an invalid context may not be treated as  an
error unless it is actually encountered during a lookup operation ". So at
least, it's some disproportion between the code and the documentation. 

I read the commit message as that a context should be validated before it's
applied. But now it's validated during lookup.



> Are there real users of libselinux that rely on the current behavior or is there some use case where
> it is desirable?

I don't know. I was thinking about setfiles but it always validate. There might be 3rd party users who
lookups for labels in chroot.


> > 
> > The reproducer code:
> > 
> > #include <errno.h>
> > #include <stdio.h>
> > 
> > #include <selinux/selinux.h>
> > #include <selinux/label.h>
> > 
> > int main() {
> >   struct selabel_handle *hnd = NULL;
> >   security_context_t selabel_context;
> > 
> >   struct selinux_opt selabel_option [] = {
> >     { SELABEL_OPT_PATH, "my_contexts" },
> >     { SELABEL_OPT_SUBSET, NULL },
> >     { SELABEL_OPT_VALIDATE, (char *) 0 },
> >     { SELABEL_OPT_BASEONLY, (char *) 0 }
> >   };
> >   int result = 0;
> > 
> >   if ((hnd = selabel_open(SELABEL_CTX_FILE, selabel_option, 4)) == NULL) {
> >     return 1;
> >   }
> > 
> >   if ((result = selabel_lookup_raw(hnd, &selabel_context, "/tmp/mypath", 0)) == -1) {
> >     perror("selabel_lookup_raw - ERROR");
> >     return 1;
> >   }
> > 
> >   printf("%s\n", selabel_context);
> > 
> >   return 0;
> > }
> > 
> > ---
> > 
> > $ gcc -o selabel_reproducer selabel_reproducer.c -lselinux
> > $ echo '/tmp/mypath  my_user_u:my_role_r:my_type_t:s' > my_contexts
> > 
> > Before:
> > 
> > $ ./selabel_reproducer
> > my_user_u:my_role_r:my_type_t:s
> > 
> > After:
> > 
> > $ ./selabel_reproducer
> > my_contexts: line 1 has invalid context my_user_u:my_role_r:my_type_t:s
> > selabel_lookup_raw - ERROR: Invalid argument
> > 
> > 
> > 
> > 
> > [1] https://copr.fedorainfracloud.org/coprs/plautrba/selinux-fedora/packages/
> > [2] https://src.fedoraproject.org/tests/selinux/tree/master
> > [3] https://src.fedoraproject.org/tests/selinux/blob/master/f/libselinux/selabel-functions
> > 
> >> If there are specific changes that you think should be called out in
> >> release notes for packagers and users in the final release announcement, let us know.
> >>
> >> Thanks to all the contributors to this release candidate!
> >>
> >> A shortlog of changes since the 2.7 release is below.
> >>
> >> Dan Cashman (1):
> >>       libsepol: cil: Add ability to redeclare types[attributes]
> >>
> >> Dominick Grift (1):
> >>       Describe multiple-decls in secilc.8.xml
> >>
> >> Grégoire Colbert (1):
> >>       Fixed bad reference in roleattribute
> >>
> >> James Carter (4):
> >>       libsepol/cil: Keep attributes used by generated attributes in neverallow rules
> >>       libsepol/cil: Create new keep field for type attribute sets
> >>       libsepol: Prevent freeing unitialized value in ibendport handling
> >>       libsepol/cil: Improve processing of context rules
> >>
> >> Jan Zarsky (6):
> >>       libsepol: reset pointer after free
> >>       libsepol: fix memory leak in sepol_bool_query()
> >>       libsepol: free ibendport device names
> >>       libsemanage: free genhomedircon fallback user
> >>       libsemanage: properly check return value of iterate function
> >>       python/sepolgen: fix typo in PolicyGenerator
> >>
> >> Lee Stubbs (1):
> >>       Minor update for bash completion. Bash completion for ports is missing '-' for type. Based on documentation, it should be --type, not -type.
> >>
> >> Lukas Vrabec (1):
> >>       python/sepolicy: Fix sepolicy manpage.
> >>
> >> Marcus Folkesson (15):
> >>       libsepol: build: follow standard semantics for DESTDIR and PREFIX
> >>       libselinux: build: follow standard semantics for DESTDIR and PREFIX
> >>       libsemanage: build: follow standard semantics for DESTDIR and PREFIX
> >>       checkpolicy: build: follow standard semantics for DESTDIR and PREFIX
> >>       gui: build: follow standard semantics for DESTDIR and PREFIX
> >>       mcstrans: build: follow standard semantics for DESTDIR and PREFIX
> >>       policycoreutils: build: follow standard semantics for DESTDIR and PREFIX
> >>       python: build: follow standard semantics for DESTDIR and PREFIX
> >>       python: build: move modules from platform-specific to platform-shared
> >>       restorecond: build: follow standard semantics for DESTDIR and PREFIX
> >>       sandbox: build: follow standard semantics for DESTDIR and PREFIX
> >>       secilc: build: follow standard semantics for DESTDIR and PREFIX
> >>       semodule-utils: build: follow standard semantics for DESTDIR and PREFIX
> >>       dbus: build: follow standard semantics for DESTDIR and PREFIX
> >>       build: setup buildpaths if DESTDIR is specified
> >>
> >> Nicolas Iooss (36):
> >>       Travis-CI: use sugulite environment
> >>       Travis-CI: do not test gold linkers with clang
> >>       sepolicy: fix Python3 syntax in manpage
> >>       sepolicy: do not fail when file_contexts.local does not exist
> >>       sepolicy: fix misspelling of _ra_content_t suffix
> >>       sepolicy: support non-MLS policy in manpage
> >>       sepolicy: support non-MCS policy in manpage
> >>       sepolicy: remove stray space in section "SEE ALSO"
> >>       libsepol: use IN6ADDR_ANY_INIT to initialize IPv6 addresses
> >>       libsepol/cil: __cil_post_db_neverallow_attr_helper() does not use extra_args
> >>       libsepol/cil: fix -Wwrite-strings warning
> >>       libsepol/cil: drop wrong unused attribute
> >>       restorecond: check write() and daemon() results
> >>       Makefile: define a default value for CFLAGS
> >>       sepolicy: do not fail when file_contexts.local or .subs do not exist
> >>       gui: port to Python 3 by migrating to PyGI
> >>       Travis-CI: fix configuration after September's update
> >>       sepolicy: ignore comments and empty lines in file_contexts.subs_dist
> >>       sepolicy: support non-MLS policy in gui
> >>       gui: remove the status bar
> >>       gui: fix parsing of "semodule -lfull" in tab Modules
> >>       gui: delete overridden definition of usersPage.delete()
> >>       gui: remove mappingsPage
> >>       Travis-CI: try working around network issues by retrying downloads
> >>       Travis-CI: do not duplicate $DESTDIR in $PYSITEDIR
> >>       python/sepolicy: Fix translated strings with parameters
> >>       python/sepolicy: Support non-MLS policy
> >>       python/sepolicy: Initialize policy.ports as a dict in generate.py
> >>       libsepol: cil: show an error when cil_expr_to_string() fails
> >>       libsemanage: silence clang static analyzer report
> >>       libselinux,libsemanage: Replace PYSITEDIR with PYTHONLIBDIR
> >>       libsepol: do not dereference NULL if stack_init fails
> >>       libsepol: ensure the level context is not empty
> >>       libselinux: label_file: fix memory management in store_stem()
> >>       libselinux: fix memory leak in getconlist
> >>       libselinux: remove unused variable usercon
> >>
> >> Petr Lautrbach (12):
> >>       libselinux: Add support for pcre2 to pkgconfig definition
> >>       python/semanage: drop *_ini functions
> >>       python/semanage: Don't use global setup variable
> >>       python/semanage: Enforce noreload only if it's requested by -N option
> >>       libsemanage: Use umask(0077) for fopen() write operations
> >>       python/semanage: make seobject.py backward compatible
> >>       python/semanage: bring semanageRecords.set_reload back
> >>       gui/polgengui.py: Fix sepolicy.generate import in polgengui.py
> >>       gui/polgengui.py: Convert polgen.glade to Builder format polgen.ui
> >>       python/sepolicy: Use list instead of map
> >>       python/sepolicy: Do not use types.BooleanType
> >>       gui/polgengui.py: Use stop_emission_by_name instead of emit_stop_by_name
> >>
> >> Richard Haines (3):
> >>       libselinux: Correct manpages regarding removable_context
> >>       libsemanage: Return commit number if save-previous false
> >>       libsemanage: Allow tmp files to be kept if a compile fails
> >>
> >> Richard Haines via Selinux (1):
> >>       selinux: Add support for the SCTP portcon keyword
> >>
> >> Stephen Smalley (4):
> >>       checkpolicy,libselinux,libsepol,policycoreutils: Update my email address
> >>       semodule-utils: remove semodule_deps
> >>       libsepol: Export sepol_polcap_getnum/name functions
> >>       Update VERSION files to 2.8-rc1
> >>
> >> Tri Vo (1):
> >>       Resolve conflicts in expandattribute.
> >>
> >> Vit Mojzis (18):
> >>       libsemanage: Keep copy of file_contexts.homedirs in policy store
> >>       libsemanage: Add support for listing fcontext.homedirs file
> >>       python/semanage: Enable listing file_contexts.homedirs
> >>       python/semanage: Fix export of ibendport entries
> >>       python/semanage: Update Infiniband code to work on python3
> >>       python/semanage: Remove redundant and broken moduleRecords.modify()
> >>       semodule-utils/semodule_package: fix semodule_unpackage man page
> >>       libsemanage: Improve warning for installing disabled module
> >>       gui/semanagePage: Close "edit" and "add" dialogues when successfull
> >>       gui/fcontextPage: Set default object class in addDialog
> >>       libsemanage: remove access() check to make setuid programs work
> >>       libsemanage: remove access() check to make setuid programs work
> >>       libsemanage: replace access() checks to make setuid programs work
> >>       libsemanage/direct_api.c: Fix iterating over array
> >>       policycoreutils/semodule: Improve man page and unify it with --help
> >>       policycoreutils/semodule: Allow enabling/disabling multiple modules at once
> >>       python/sepolgen: Try to translate SELinux contexts to raw
> >>       libsemanage: do not change file mode of seusers and users_extra
> >>
> >> Yuli Khodorkovskiy (3):
> >>       secilc: Fix documentation build for OS X systems
> >>       libselinux: verify file_contexts when using restorecon
> >>       libselinux: echo line number of bad label in selabel_fini()
> >>
> >>
> 

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux