Disregard these and wait for v2, a test is failing that I thought was
passing.

On Wed, Aug 10, 2016 at 2:51 PM, <william.c.robe...@intel.com> wrote:

> From: William Roberts <william.c.robe...@intel.com>
>
> Throughout libsepol, values taken from sepolicy are used in
> places where length == 0 or length == <saturated> matter,
> find and fix these.
>
> Also, correct any type mismatches noticed along the way.
>
> Signed-off-by: William Roberts <william.c.robe...@intel.com>
> ---
>  libsepol/src/conditional.c    |  3 ++-
>  libsepol/src/context.c        | 16 +++++++++-----
>  libsepol/src/context_record.c | 26 ++++++++++++----------
>  libsepol/src/module.c         | 13 +++++++++++
>  libsepol/src/module_to_cil.c  |  4 +++-
>  libsepol/src/policydb.c       | 50 ++++++++++++++++++++++++++++++
> ++++++++++---
>  libsepol/src/private.h        |  2 ++
>  7 files changed, 93 insertions(+), 21 deletions(-)
>
> diff --git a/libsepol/src/conditional.c b/libsepol/src/conditional.c
> index ea47cdd..8680eb2 100644
> --- a/libsepol/src/conditional.c
> +++ b/libsepol/src/conditional.c
> @@ -589,7 +589,8 @@ int cond_read_bool(policydb_t * p,
>                 goto err;
>
>         len = le32_to_cpu(buf[2]);
> -
> +       if (zero_or_saturated(len))
> +               goto err;
>         key = malloc(len + 1);
>         if (!key)
>                 goto err;
> diff --git a/libsepol/src/context.c b/libsepol/src/context.c
> index 84dad34..39552f2 100644
> --- a/libsepol/src/context.c
> +++ b/libsepol/src/context.c
> @@ -10,6 +10,7 @@
>  #include "context.h"
>  #include "handle.h"
>  #include "mls.h"
> +#include "private.h"
>
>  /* ----- Compatibility ---- */
>  int policydb_context_isvalid(const policydb_t * p, const context_struct_t
> * c)
> @@ -297,10 +298,18 @@ int context_from_string(sepol_handle_t * handle,
>         char *con_cpy = NULL;
>         sepol_context_t *ctx_record = NULL;
>
> +       if (zero_or_saturated(con_str_len)) {
> +               ERR(handle, "Invalid context length");
> +               goto err;
> +       }
> +
>         /* sepol_context_from_string expects a NULL-terminated string */
>         con_cpy = malloc(con_str_len + 1);
> -       if (!con_cpy)
> -               goto omem;
> +       if (!con_cpy) {
> +               ERR(handle, "out of memory");
> +               goto err;
> +       }
> +
>         memcpy(con_cpy, con_str, con_str_len);
>         con_cpy[con_str_len] = '\0';
>
> @@ -315,9 +324,6 @@ int context_from_string(sepol_handle_t * handle,
>         sepol_context_free(ctx_record);
>         return STATUS_SUCCESS;
>
> -      omem:
> -       ERR(handle, "out of memory");
> -
>        err:
>         ERR(handle, "could not create context structure");
>         free(con_cpy);
> diff --git a/libsepol/src/context_record.c b/libsepol/src/context_record.c
> index ac2884a..01fd2c9 100644
> --- a/libsepol/src/context_record.c
> +++ b/libsepol/src/context_record.c
> @@ -5,6 +5,7 @@
>
>  #include "context_internal.h"
>  #include "debug.h"
> +#include "private.h"
>
>  struct sepol_context {
>
> @@ -284,17 +285,23 @@ int sepol_context_to_string(sepol_handle_t * handle,
>  {
>
>         int rc;
> -       const int user_sz = strlen(con->user);
> -       const int role_sz = strlen(con->role);
> -       const int type_sz = strlen(con->type);
> -       const int mls_sz = (con->mls) ? strlen(con->mls) : 0;
> -       const int total_sz = user_sz + role_sz + type_sz +
> +       const size_t user_sz = strlen(con->user);
> +       const size_t role_sz = strlen(con->role);
> +       const size_t type_sz = strlen(con->type);
> +       const size_t mls_sz = (con->mls) ? strlen(con->mls) : 0;
> +       const size_t total_sz = user_sz + role_sz + type_sz +
>             mls_sz + ((con->mls) ? 3 : 2);
>
> -       char *str = (char *)malloc(total_sz + 1);
> -       if (!str)
> -               goto omem;
> +       if (zero_or_saturated(total_sz)) {
> +               ERR(handle, "invalid size");
> +               goto err;
> +       }
>
> +       char *str = (char *)malloc(total_sz + 1);
> +       if (!str) {
> +               ERR(handle, "out of memory");
> +               goto err;
> +       }
>         if (con->mls) {
>                 rc = snprintf(str, total_sz + 1, "%s:%s:%s:%s",
>                               con->user, con->role, con->type, con->mls);
> @@ -314,9 +321,6 @@ int sepol_context_to_string(sepol_handle_t * handle,
>         *str_ptr = str;
>         return STATUS_SUCCESS;
>
> -      omem:
> -       ERR(handle, "out of memory");
> -
>        err:
>         ERR(handle, "could not convert context to string");
>         free(str);
> diff --git a/libsepol/src/module.c b/libsepol/src/module.c
> index 1665ede..f25df95 100644
> --- a/libsepol/src/module.c
> +++ b/libsepol/src/module.c
> @@ -30,6 +30,7 @@
>  #include <stdio.h>
>  #include <stdlib.h>
>  #include <limits.h>
> +#include <inttypes.h>
>
>  #define SEPOL_PACKAGE_SECTION_FC 0xf97cff90
>  #define SEPOL_PACKAGE_SECTION_SEUSER 0x97cff91
> @@ -793,6 +794,12 @@ int sepol_module_package_info(struct
> sepol_policy_file *spf, int *type,
>                                 goto cleanup;
>                         }
>                         len = le32_to_cpu(buf[0]);
> +                       if (zero_or_saturated(len)) {
> +                               ERR(file->handle,
> +                                   "invalid module name length:
> 0x%"PRIx32,
> +                                   len);
> +                               goto cleanup;
> +                       }
>                         *name = malloc(len + 1);
>                         if (!*name) {
>                                 ERR(file->handle, "out of memory");
> @@ -814,6 +821,12 @@ int sepol_module_package_info(struct
> sepol_policy_file *spf, int *type,
>                                 goto cleanup;
>                         }
>                         len = le32_to_cpu(buf[0]);
> +                       if (zero_or_saturated(len)) {
> +                               ERR(file->handle,
> +                                   "invalid module version length:
> 0x%"PRIx32,
> +                                   len);
> +                               goto cleanup;
> +                       }
>                         *version = malloc(len + 1);
>                         if (!*version) {
>                                 ERR(file->handle, "out of memory");
> diff --git a/libsepol/src/module_to_cil.c b/libsepol/src/module_to_cil.c
> index 36f3b7d..fc65019 100644
> --- a/libsepol/src/module_to_cil.c
> +++ b/libsepol/src/module_to_cil.c
> @@ -47,6 +47,8 @@
>  #include <sepol/policydb/services.h>
>  #include <sepol/policydb/util.h>
>
> +#include "private.h"
> +
>  #ifdef __GNUC__
>  #  define UNUSED(x) UNUSED_ ## x __attribute__((__unused__))
>  #else
> @@ -124,7 +126,7 @@ static int get_line(char **start, char *end, char
> **line)
>
>         for (len = 0; p < end && *p != '\n' && *p != '\0'; p++, len++);
>
> -       if (len == 0) {
> +       if (zero_or_saturated(len)) {
>                 rc = 0;
>                 goto exit;
>         }
> diff --git a/libsepol/src/policydb.c b/libsepol/src/policydb.c
> index 971793d..c2e1a43 100644
> --- a/libsepol/src/policydb.c
> +++ b/libsepol/src/policydb.c
> @@ -1911,6 +1911,9 @@ static int perm_read(policydb_t * p
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         perdatum->s.value = le32_to_cpu(buf[1]);
>
>         key = malloc(len + 1);
> @@ -1949,6 +1952,9 @@ static int common_read(policydb_t * p, hashtab_t h,
> struct policy_file *fp)
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         comdatum->s.value = le32_to_cpu(buf[1]);
>
>         if (symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE))
> @@ -2092,7 +2098,11 @@ static int class_read(policydb_t * p, hashtab_t h,
> struct policy_file *fp)
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
>         len2 = le32_to_cpu(buf[1]);
> +       if (len2 == 0 || len2 == SIZE_MAX)
> +               goto bad;
>         cladatum->s.value = le32_to_cpu(buf[2]);
>
>         if (symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE))
> @@ -2199,6 +2209,9 @@ static int role_read(policydb_t * p, hashtab_t h,
> struct policy_file *fp)
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         role->s.value = le32_to_cpu(buf[1]);
>         if (policydb_has_boundary_feature(p))
>                 role->bounds = le32_to_cpu(buf[2]);
> @@ -2287,6 +2300,9 @@ static int type_read(policydb_t * p, hashtab_t h,
> struct policy_file *fp)
>                 goto bad;
>
>         len = le32_to_cpu(buf[pos]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         typdatum->s.value = le32_to_cpu(buf[++pos]);
>         if (policydb_has_boundary_feature(p)) {
>                 uint32_t properties;
> @@ -2556,6 +2572,9 @@ static int ocontext_read_xen(struct
> policydb_compat_info *info,
>                                 if (rc < 0)
>                                         return -1;
>                                 len = le32_to_cpu(buf[0]);
> +                               if (zero_or_saturated(len))
> +                                       return -1;
> +
>                                 c->u.name = malloc(len + 1);
>                                 if (!c->u.name)
>                                         return -1;
> @@ -2618,6 +2637,8 @@ static int ocontext_read_selinux(struct
> policydb_compat_info *info,
>                                 if (rc < 0)
>                                         return -1;
>                                 len = le32_to_cpu(buf[0]);
> +                               if (zero_or_saturated(len))
> +                                       return -1;
>                                 c->u.name = malloc(len + 1);
>                                 if (!c->u.name)
>                                         return -1;
> @@ -2659,6 +2680,8 @@ static int ocontext_read_selinux(struct
> policydb_compat_info *info,
>                                         return -1;
>                                 c->v.behavior = le32_to_cpu(buf[0]);
>                                 len = le32_to_cpu(buf[1]);
> +                               if (zero_or_saturated(len))
> +                                       return -1;
>                                 c->u.name = malloc(len + 1);
>                                 if (!c->u.name)
>                                         return -1;
> @@ -2719,7 +2742,7 @@ static int genfs_read(policydb_t * p, struct
> policy_file *fp)
>         uint32_t buf[1];
>         size_t nel, nel2, len, len2;
>         genfs_t *genfs_p, *newgenfs, *genfs;
> -       unsigned int i, j;
> +       size_t i, j;
>         ocontext_t *l, *c, *newc = NULL;
>         int rc;
>
> @@ -2733,6 +2756,8 @@ static int genfs_read(policydb_t * p, struct
> policy_file *fp)
>                 if (rc < 0)
>                         goto bad;
>                 len = le32_to_cpu(buf[0]);
> +               if (zero_or_saturated(len))
> +                       goto bad;
>                 newgenfs = calloc(1, sizeof(genfs_t));
>                 if (!newgenfs)
>                         goto bad;
> @@ -2778,6 +2803,8 @@ static int genfs_read(policydb_t * p, struct
> policy_file *fp)
>                         if (rc < 0)
>                                 goto bad;
>                         len = le32_to_cpu(buf[0]);
> +                       if (zero_or_saturated(len))
> +                               goto bad;
>                         newc->u.name = malloc(len + 1);
>                         if (!newc->u.name) {
>                                 goto bad;
> @@ -2877,6 +2904,9 @@ static int user_read(policydb_t * p, hashtab_t h,
> struct policy_file *fp)
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         usrdatum->s.value = le32_to_cpu(buf[1]);
>         if (policydb_has_boundary_feature(p))
>                 usrdatum->bounds = le32_to_cpu(buf[2]);
> @@ -2960,6 +2990,9 @@ static int sens_read(policydb_t * p
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(len))
> +               goto bad;
> +
>         levdatum->isalias = le32_to_cpu(buf[1]);
>
>         key = malloc(len + 1);
> @@ -3003,6 +3036,9 @@ static int cat_read(policydb_t * p
>                 goto bad;
>
>         len = le32_to_cpu(buf[0]);
> +       if(zero_or_saturated(len))
> +               goto bad;
> +
>         catdatum->s.value = le32_to_cpu(buf[1]);
>         catdatum->isalias = le32_to_cpu(buf[2]);
>
> @@ -3339,6 +3375,8 @@ static int 
> filename_trans_rule_read(filename_trans_rule_t
> ** r, struct policy_fi
>                         return -1;
>
>                 len = le32_to_cpu(buf[0]);
> +               if (zero_or_saturated(len))
> +                       return -1;
>
>                 ftr->name = malloc(len + 1);
>                 if (!ftr->name)
> @@ -3580,6 +3618,8 @@ static int scope_read(policydb_t * p, int symnum,
> struct policy_file *fp)
>         if (rc < 0)
>                 goto cleanup;
>         key_len = le32_to_cpu(buf[0]);
> +       if (zero_or_saturated(key_len))
> +               goto cleanup;
>         key = malloc(key_len + 1);
>         if (!key)
>                 goto cleanup;
> @@ -3664,8 +3704,8 @@ int policydb_read(policydb_t * p, struct policy_file
> *fp, unsigned verbose)
>         }
>
>         len = buf[1];
> -       if (len > POLICYDB_STRING_MAX_LENGTH) {
> -               ERR(fp->handle, "policydb string length too long ");
> +       if (len == 0 || len > POLICYDB_STRING_MAX_LENGTH) {
> +               ERR(fp->handle, "policydb string length %s ", len ? "too
> long" : "zero");
>                 return POLICYDB_ERROR;
>         }
>
> @@ -3798,6 +3838,8 @@ int policydb_read(policydb_t * p, struct policy_file
> *fp, unsigned verbose)
>                         goto bad;
>                 }
>                 len = le32_to_cpu(buf[0]);
> +               if (zero_or_saturated(len))
> +                       goto bad;
>                 if ((p->name = malloc(len + 1)) == NULL) {
>                         goto bad;
>                 }
> @@ -3809,6 +3851,8 @@ int policydb_read(policydb_t * p, struct policy_file
> *fp, unsigned verbose)
>                         goto bad;
>                 }
>                 len = le32_to_cpu(buf[0]);
> +               if (zero_or_saturated(len))
> +                       goto bad;
>                 if ((p->version = malloc(len + 1)) == NULL) {
>                         goto bad;
>                 }
> diff --git a/libsepol/src/private.h b/libsepol/src/private.h
> index 9c700c9..5bc5d64 100644
> --- a/libsepol/src/private.h
> +++ b/libsepol/src/private.h
> @@ -45,6 +45,8 @@
>
>  #define ARRAY_SIZE(x) (sizeof(x)/sizeof((x)[0]))
>
> +#define zero_or_saturated(x) ((x == 0) || (x == (typeof(x))-1))
> +
>  /* Policy compatibility information. */
>  struct policydb_compat_info {
>         unsigned int type;
> --
> 1.9.1
>
> _______________________________________________
> Seandroid-list mailing list
> Seandroid-list@tycho.nsa.gov
> To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
> To get help, send an email containing "help" to
> seandroid-list-requ...@tycho.nsa.gov.
>



-- 
Respectfully,

William C Roberts
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to