Go to file
Yuli Khodorkovskiy 814631d3ae libselinux: verify file_contexts when using restorecon
In permissive mode, calling restorecon with a bad label in file_contexts
does not verify the label's existence in the loaded policy. This
results in any label successfully applying to a file, as long as the
file exists.

This issue has two assumptions:

1) file_contexts must be manually updated with the invalid label.
Running `semanage fcontext` will error when attempting to add
an invalid label to file_contexts.
2) the system must be in permissive. Although applying an invalid label
in enforcing gives an error and fails, successfully labeling a file with a
bad label could cause issues during policy development in permissive.

Instead, as each context is used, verify it is valid before blindly
applying the label. If an error with validation occurs in restorecon,
application of remaining valid labels will be uninterrupted as before.

Signed-off-by: Yuli Khodorkovskiy <ykhodo@gmail.com>
2018-04-04 11:09:11 -05:00
checkpolicy Resolve conflicts in expandattribute. 2018-03-26 12:29:37 -07:00
dbus dbus: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:03 +01:00
gui gui/fcontextPage: Set default object class in addDialog 2018-03-01 09:42:18 -05:00
libselinux libselinux: verify file_contexts when using restorecon 2018-04-04 11:09:11 -05:00
libsemanage libsemanage/direct_api.c: Fix iterating over array 2018-03-19 09:18:28 -07:00
libsepol libsepol/cil: Improve processing of context rules 2018-03-29 15:53:18 -04:00
mcstrans mcstrans: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 15:59:38 +01:00
policycoreutils policycoreutils/semodule: Allow enabling/disabling multiple modules at once 2018-03-26 10:19:51 -04:00
python python/sepolgen: fix typo in PolicyGenerator 2018-03-08 14:56:19 -05:00
restorecond restorecond: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:02 +01:00
sandbox sandbox: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 20:02:02 +01:00
scripts Fix release script 2016-11-16 11:19:51 -05:00
secilc selinux: Add support for the SCTP portcon keyword 2018-03-19 12:34:29 -04:00
semodule-utils semodule-utils/semodule_package: fix semodule_unpackage man page 2018-02-26 09:52:02 -05:00
.gitignore restorecond: Add gitignore 2016-11-16 11:20:05 -05:00
.travis.yml libselinux,libsemanage: Replace PYSITEDIR with PYTHONLIBDIR 2018-03-17 09:03:33 +01:00
CleanSpec.mk Add empty top level Android.mk / CleanSpec.mk files 2015-04-16 07:54:09 -04:00
Makefile build: setup buildpaths if DESTDIR is specified 2018-02-14 20:02:03 +01:00
README libsepol: build: follow standard semantics for DESTDIR and PREFIX 2018-02-14 15:59:36 +01:00

Please submit all bug reports and patches to selinux@tycho.nsa.gov.
Subscribe via selinux-join@tycho.nsa.gov.

Build dependencies on Fedora:
yum install audit-libs-devel bison bzip2-devel dbus-devel dbus-glib-devel flex flex-devel flex-static glib2-devel libcap-devel libcap-ng-devel pam-devel pcre-devel python-devel setools-devel swig xmlto redhat-rpm-config

To build and install everything under a private directory, run:
make DESTDIR=~/obj install install-pywrap

To install as the default system libraries and binaries
(overwriting any previously installed ones - dangerous!),
on x86_64, run:
make LIBDIR=/usr/lib64 SHLIBDIR=/lib64 install install-pywrap relabel
or on x86 (32-bit), run:
make install install-pywrap relabel

This may render your system unusable if the upstream SELinux userspace
lacks library functions or other dependencies relied upon by your
distribution.  If it breaks, you get to keep both pieces.

To install libsepol on macOS (mainly for policy analysis):
cd libsepol; make PREFIX=/usr/local install

This requires GNU coreutils (brew install coreutils).