Blame SOURCES/CVE-2023-3776.patch

10ce47
From 8a3e286f2ff1f83ffd645cbad1cb49f80ab2ab00 Mon Sep 17 00:00:00 2001
10ce47
From: Ryan Sullivan <rysulliv@redhat.com>
10ce47
Date: Tue, 17 Oct 2023 13:28:46 -0400
10ce47
Subject: [KPATCH CVE-2023-3776] kpatch fixes for CVE-2023-3776
10ce47
10ce47
Kernels:
10ce47
3.10.0-1160.90.1.el7
10ce47
3.10.0-1160.92.1.el7
10ce47
3.10.0-1160.95.1.el7
10ce47
3.10.0-1160.99.1.el7
10ce47
3.10.0-1160.102.1.el7
10ce47
10ce47
10ce47
Kpatch-MR: https://gitlab.com/redhat/prdsc/rhel/src/kpatch/rhel-7/-/merge_requests/61
10ce47
Approved-by: Joe Lawrence (@joe.lawrence)
10ce47
Approved-by: Yannick Cote (@ycote1)
10ce47
Changes since last build:
10ce47
arches: x86_64 ppc64le
10ce47
cls_fw.o: changed function: fw_change
10ce47
cls_fw.o: changed function: fw_set_parms
10ce47
cls_route.o: changed function: route4_change
10ce47
cls_u32.o: changed function: u32_change
10ce47
sch_qfq.o: changed function: qfq_enqueue
10ce47
---------------------------
10ce47
10ce47
Modifications: none
10ce47
10ce47
commit 726e9f3d88c729cdae09768c94e588deebdb9d52
10ce47
Author: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
Date:   Mon Jan 23 17:17:17 2023 -0300
10ce47
10ce47
    KVM: x86: rename argument to kvm_set_tsc_khz
10ce47
10ce47
    commit 4941b8cb3746f09bb102f7a5d64d878e96a0c6cd
10ce47
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
10ce47
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
10ce47
    Testing: Tested by QE
10ce47
10ce47
    This refers to the desired (scaled) frequency, which is called
10ce47
    user_tsc_khz in the rest of the file.
10ce47
10ce47
    Reviewed-by: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
10ce47
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
10ce47
commit 866faa0e99083ee93d04d3c37065cf8dbfc51a34
10ce47
Author: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
Date:   Mon Jan 23 17:24:19 2023 -0300
10ce47
10ce47
    KVM: x86: rewrite handling of scaled TSC for kvmclock
10ce47
10ce47
    commit 78db6a5037965429c04d708281f35a6e5562d31b
10ce47
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
10ce47
    Testing: Tested by QE
10ce47
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
10ce47
10ce47
    This is the same as before:
10ce47
10ce47
        kvm_scale_tsc(tgt_tsc_khz)
10ce47
            = tgt_tsc_khz * ratio
10ce47
            = tgt_tsc_khz * user_tsc_khz / tsc_khz   (see set_tsc_khz)
10ce47
            = user_tsc_khz                           (see kvm_guest_time_update)
10ce47
            = vcpu->arch.virtual_tsc_khz             (see kvm_set_tsc_khz)
10ce47
10ce47
    However, computing it through kvm_scale_tsc will make it possible
10ce47
    to include the NTP correction in tgt_tsc_khz.
10ce47
10ce47
    Reviewed-by: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
10ce47
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
10ce47
commit bde6eebb5708ecd38db0023e657d38058e0d962f
10ce47
Author: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
Date:   Wed Jan 25 16:07:18 2023 -0300
10ce47
10ce47
    KVM: x86: add bit to indicate correct tsc_shift
10ce47
10ce47
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
10ce47
    Testing: Tested by QE
10ce47
    Upstream Status: RHEL7 only
10ce47
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
10ce47
10ce47
    This changeset is unique to RHEL-7 since it was decided
10ce47
    it is not necessary upstream:
10ce47
10ce47
    "I don't think it's justifiable to further complicate the userspace API for a
10ce47
    bug that's been fixed six years ago.  I'd be very surprised if any combination
10ce47
    of modern upstream {QEMU,kernel} is going to do a successful migration from
10ce47
    such an old {QEMU,kernel}.  RHEL/CentOS are able to do so because *specific
10ce47
    pairs* have been tested, but as far as upstream is concerned this adds
10ce47
    complexity that absolutely no one will use."
10ce47
10ce47
    Before commit 78db6a5037965429c04d708281f35a6e5562d31b,
10ce47
    kvm_guest_time_update() would use vcpu->virtual_tsc_khz to calculate
10ce47
    tsc_shift value in the vcpus pvclock structure written to guest memory.
10ce47
10ce47
    For those kernels, if vcpu->virtual_tsc_khz != tsc_khz (which can be the
10ce47
    case when guest state is restored via migration, or if tsc-khz option is
10ce47
    passed to QEMU), and TSC scaling is not enabled (which happens if the
10ce47
    difference between the frequency requested via KVM_SET_TSC_KHZ and the
10ce47
    host TSC KHZ is smaller than 250ppm), then there can be a difference
10ce47
    between what KVM_GET_CLOCK would return and what the guest reads as
10ce47
    kvmclock value.
10ce47
10ce47
    When KVM_SET_CLOCK'ing what is read with KVM_GET_CLOCK, the
10ce47
    guest can observe a forward or backwards time jump.
10ce47
10ce47
    Advertise to userspace that current kernel contains
10ce47
    this fix, so QEMU can workaround the problem by reading
10ce47
    pvclock via guest memory directly otherwise.
10ce47
10ce47
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
10ce47
10ce47
commit 373ed8339c956ce1d9049737bab779f143fc1267
10ce47
Author: Davide Caratti <dcaratti@redhat.com>
10ce47
Date:   Tue Aug 8 11:57:51 2023 +0200
10ce47
10ce47
    net/sched: cls_fw: Fix improper refcount update leads to use-after-free
10ce47
10ce47
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2225639
10ce47
    CVE: CVE-2023-3776
10ce47
    Upstream Status: net.git commit 0323bce598ee
10ce47
    Conflicts:
10ce47
     - net/sched/cls_fw.c: context mismatch because of missing backport
10ce47
       of upstream commit a51486266c3b ("net: sched: remove NET_CLS_IND
10ce47
       config option")
10ce47
10ce47
    commit 0323bce598eea038714f941ce2b22541c46d488f
10ce47
    Author: M A Ramdhan <ramdhan@starlabs.sg>
10ce47
    Date:   Wed Jul 5 12:15:30 2023 -0400
10ce47
10ce47
        net/sched: cls_fw: Fix improper refcount update leads to use-after-free
10ce47
10ce47
        In the event of a failure in tcf_change_indev(), fw_set_parms() will
10ce47
        immediately return an error after incrementing or decrementing
10ce47
        reference counter in tcf_bind_filter().  If attacker can control
10ce47
        reference counter to zero and make reference freed, leading to
10ce47
        use after free.
10ce47
10ce47
        In order to prevent this, move the point of possible failure above the
10ce47
        point where the TC_FW_CLASSID is handled.
10ce47
10ce47
        Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
10ce47
        Reported-by: M A Ramdhan <ramdhan@starlabs.sg>
10ce47
        Signed-off-by: M A Ramdhan <ramdhan@starlabs.sg>
10ce47
        Acked-by: Jamal Hadi Salim <jhs@mojatatu.com>
10ce47
        Reviewed-by: Pedro Tammela <pctammela@mojatatu.com>
10ce47
        Message-ID: <20230705161530.52003-1-ramdhan@starlabs.sg>
10ce47
        Signed-off-by: Jakub Kicinski <kuba@kernel.org>
10ce47
10ce47
    Signed-off-by: Davide Caratti <dcaratti@redhat.com>
10ce47
10ce47
Signed-off-by: Ryan Sullivan <rysulliv@redhat.com>
10ce47
---
10ce47
 net/sched/cls_fw.c | 10 +++++-----
10ce47
 1 file changed, 5 insertions(+), 5 deletions(-)
10ce47
10ce47
diff --git a/net/sched/cls_fw.c b/net/sched/cls_fw.c
10ce47
index e05043266620..3427222f8e60 100644
10ce47
--- a/net/sched/cls_fw.c
10ce47
+++ b/net/sched/cls_fw.c
10ce47
@@ -218,11 +218,6 @@ static int fw_set_parms(struct net *net, struct tcf_proto *tp,
10ce47
 	if (err < 0)
10ce47
 		return err;
10ce47
 
10ce47
-	if (tb[TCA_FW_CLASSID]) {
10ce47
-		f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
10ce47
-		tcf_bind_filter(tp, &f->res, base);
10ce47
-	}
10ce47
-
10ce47
 #ifdef CONFIG_NET_CLS_IND
10ce47
 	if (tb[TCA_FW_INDEV]) {
10ce47
 		int ret;
10ce47
@@ -241,6 +236,11 @@ static int fw_set_parms(struct net *net, struct tcf_proto *tp,
10ce47
 	} else if (head->mask != 0xFFFFFFFF)
10ce47
 		return err;
10ce47
 
10ce47
+	if (tb[TCA_FW_CLASSID]) {
10ce47
+		f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
10ce47
+		tcf_bind_filter(tp, &f->res, base);
10ce47
+	}
10ce47
+
10ce47
 	return 0;
10ce47
 }
10ce47
 
10ce47
-- 
10ce47
2.41.0
10ce47
10ce47