Blame SOURCES/CVE-2023-4128.patch

e1f7b5
From d755c1f10a580e972fafb7bebf24378b5b830b98 Mon Sep 17 00:00:00 2001
e1f7b5
From: Ryan Sullivan <rysulliv@redhat.com>
e1f7b5
Date: Tue, 7 Nov 2023 15:04:48 -0500
e1f7b5
Subject: [KPATCH CVE-2023-4128] kpatch fixes for CVE-2023-4128
e1f7b5
e1f7b5
Kernels:
e1f7b5
3.10.0-1160.90.1.el7
e1f7b5
3.10.0-1160.92.1.el7
e1f7b5
3.10.0-1160.95.1.el7
e1f7b5
3.10.0-1160.99.1.el7
e1f7b5
3.10.0-1160.102.1.el7
e1f7b5
e1f7b5
e1f7b5
Kpatch-MR: https://gitlab.com/redhat/prdsc/rhel/src/kpatch/rhel-7/-/merge_requests/62
e1f7b5
Approved-by: Joe Lawrence (@joe.lawrence)
e1f7b5
Approved-by: Yannick Cote (@ycote1)
e1f7b5
Changes since last build:
e1f7b5
arches: x86_64 ppc64le
e1f7b5
cls_fw.o: changed function: fw_change
e1f7b5
cls_fw.o: changed function: fw_set_parms
e1f7b5
cls_route.o: changed function: route4_change
e1f7b5
cls_u32.o: changed function: u32_change
e1f7b5
sch_qfq.o: changed function: qfq_enqueue
e1f7b5
---------------------------
e1f7b5
e1f7b5
Modifications: none
e1f7b5
e1f7b5
commit 726e9f3d88c729cdae09768c94e588deebdb9d52
e1f7b5
Author: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
Date:   Mon Jan 23 17:17:17 2023 -0300
e1f7b5
e1f7b5
    KVM: x86: rename argument to kvm_set_tsc_khz
e1f7b5
e1f7b5
    commit 4941b8cb3746f09bb102f7a5d64d878e96a0c6cd
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
e1f7b5
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
e1f7b5
    Testing: Tested by QE
e1f7b5
e1f7b5
    This refers to the desired (scaled) frequency, which is called
e1f7b5
    user_tsc_khz in the rest of the file.
e1f7b5
e1f7b5
    Reviewed-by: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
e1f7b5
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
e1f7b5
commit 866faa0e99083ee93d04d3c37065cf8dbfc51a34
e1f7b5
Author: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
Date:   Mon Jan 23 17:24:19 2023 -0300
e1f7b5
e1f7b5
    KVM: x86: rewrite handling of scaled TSC for kvmclock
e1f7b5
e1f7b5
    commit 78db6a5037965429c04d708281f35a6e5562d31b
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
e1f7b5
    Testing: Tested by QE
e1f7b5
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
e1f7b5
e1f7b5
    This is the same as before:
e1f7b5
e1f7b5
        kvm_scale_tsc(tgt_tsc_khz)
e1f7b5
            = tgt_tsc_khz * ratio
e1f7b5
            = tgt_tsc_khz * user_tsc_khz / tsc_khz   (see set_tsc_khz)
e1f7b5
            = user_tsc_khz                           (see kvm_guest_time_update)
e1f7b5
            = vcpu->arch.virtual_tsc_khz             (see kvm_set_tsc_khz)
e1f7b5
e1f7b5
    However, computing it through kvm_scale_tsc will make it possible
e1f7b5
    to include the NTP correction in tgt_tsc_khz.
e1f7b5
e1f7b5
    Reviewed-by: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
e1f7b5
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
e1f7b5
commit bde6eebb5708ecd38db0023e657d38058e0d962f
e1f7b5
Author: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
Date:   Wed Jan 25 16:07:18 2023 -0300
e1f7b5
e1f7b5
    KVM: x86: add bit to indicate correct tsc_shift
e1f7b5
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2152838
e1f7b5
    Testing: Tested by QE
e1f7b5
    Upstream Status: RHEL7 only
e1f7b5
    JIRA: https://issues.redhat.com/browse/RHELPLAN-141963
e1f7b5
e1f7b5
    This changeset is unique to RHEL-7 since it was decided
e1f7b5
    it is not necessary upstream:
e1f7b5
e1f7b5
    "I don't think it's justifiable to further complicate the userspace API for a
e1f7b5
    bug that's been fixed six years ago.  I'd be very surprised if any combination
e1f7b5
    of modern upstream {QEMU,kernel} is going to do a successful migration from
e1f7b5
    such an old {QEMU,kernel}.  RHEL/CentOS are able to do so because *specific
e1f7b5
    pairs* have been tested, but as far as upstream is concerned this adds
e1f7b5
    complexity that absolutely no one will use."
e1f7b5
e1f7b5
    Before commit 78db6a5037965429c04d708281f35a6e5562d31b,
e1f7b5
    kvm_guest_time_update() would use vcpu->virtual_tsc_khz to calculate
e1f7b5
    tsc_shift value in the vcpus pvclock structure written to guest memory.
e1f7b5
e1f7b5
    For those kernels, if vcpu->virtual_tsc_khz != tsc_khz (which can be the
e1f7b5
    case when guest state is restored via migration, or if tsc-khz option is
e1f7b5
    passed to QEMU), and TSC scaling is not enabled (which happens if the
e1f7b5
    difference between the frequency requested via KVM_SET_TSC_KHZ and the
e1f7b5
    host TSC KHZ is smaller than 250ppm), then there can be a difference
e1f7b5
    between what KVM_GET_CLOCK would return and what the guest reads as
e1f7b5
    kvmclock value.
e1f7b5
e1f7b5
    When KVM_SET_CLOCK'ing what is read with KVM_GET_CLOCK, the
e1f7b5
    guest can observe a forward or backwards time jump.
e1f7b5
e1f7b5
    Advertise to userspace that current kernel contains
e1f7b5
    this fix, so QEMU can workaround the problem by reading
e1f7b5
    pvclock via guest memory directly otherwise.
e1f7b5
e1f7b5
    Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
e1f7b5
e1f7b5
commit 55a81001d2c4927795b36be55f54675f325c9ef2
e1f7b5
Author: Davide Caratti <dcaratti@redhat.com>
e1f7b5
Date:   Wed Aug 9 15:22:14 2023 +0200
e1f7b5
e1f7b5
    net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2228703
e1f7b5
    CVE: CVE-2023-4128
e1f7b5
    Upstream Status: net.git commit b80b829e9e2c
e1f7b5
e1f7b5
    commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
e1f7b5
    Author: valis <sec@valis.email>
e1f7b5
    Date:   Sat Jul 29 08:32:02 2023 -0400
e1f7b5
e1f7b5
        net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
        When route4_change() is called on an existing filter, the whole
e1f7b5
        tcf_result struct is always copied into the new instance of the filter.
e1f7b5
e1f7b5
        This causes a problem when updating a filter bound to a class,
e1f7b5
        as tcf_unbind_filter() is always called on the old instance in the
e1f7b5
        success path, decreasing filter_cnt of the still referenced class
e1f7b5
        and allowing it to be deleted, leading to a use-after-free.
e1f7b5
e1f7b5
        Fix this by no longer copying the tcf_result struct from the old filter.
e1f7b5
e1f7b5
        Fixes: 1109c00547fc ("net: sched: RCU cls_route")
e1f7b5
        Reported-by: valis <sec@valis.email>
e1f7b5
        Reported-by: Bing-Jhong Billy Jheng <billy@starlabs.sg>
e1f7b5
        Signed-off-by: valis <sec@valis.email>
e1f7b5
        Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com>
e1f7b5
        Reviewed-by: Victor Nogueira <victor@mojatatu.com>
e1f7b5
        Reviewed-by: Pedro Tammela <pctammela@mojatatu.com>
e1f7b5
        Reviewed-by: M A Ramdhan <ramdhan@starlabs.sg>
e1f7b5
        Link: https://lore.kernel.org/r/20230729123202.72406-4-jhs@mojatatu.com
e1f7b5
        Signed-off-by: Jakub Kicinski <kuba@kernel.org>
e1f7b5
e1f7b5
    Signed-off-by: Davide Caratti <dcaratti@redhat.com>
e1f7b5
e1f7b5
commit 820985c32b9616c7e793206ef8f8aff7c5ccfc8b
e1f7b5
Author: Davide Caratti <dcaratti@redhat.com>
e1f7b5
Date:   Wed Aug 9 15:22:15 2023 +0200
e1f7b5
e1f7b5
    net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2228703
e1f7b5
    CVE: CVE-2023-4128
e1f7b5
    Upstream Status: net.git commit 76e42ae83199
e1f7b5
    Conflicts:
e1f7b5
     - net/sched/cls_fw.c: context mismatch because of missing upstream commit
e1f7b5
       a51486266c3b ("net: sched: remove NET_CLS_IND config option")
e1f7b5
e1f7b5
    commit 76e42ae831991c828cffa8c37736ebfb831ad5ec
e1f7b5
    Author: valis <sec@valis.email>
e1f7b5
    Date:   Sat Jul 29 08:32:01 2023 -0400
e1f7b5
e1f7b5
        net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
        When fw_change() is called on an existing filter, the whole
e1f7b5
        tcf_result struct is always copied into the new instance of the filter.
e1f7b5
e1f7b5
        This causes a problem when updating a filter bound to a class,
e1f7b5
        as tcf_unbind_filter() is always called on the old instance in the
e1f7b5
        success path, decreasing filter_cnt of the still referenced class
e1f7b5
        and allowing it to be deleted, leading to a use-after-free.
e1f7b5
e1f7b5
        Fix this by no longer copying the tcf_result struct from the old filter.
e1f7b5
e1f7b5
        Fixes: e35a8ee5993b ("net: sched: fw use RCU")
e1f7b5
        Reported-by: valis <sec@valis.email>
e1f7b5
        Reported-by: Bing-Jhong Billy Jheng <billy@starlabs.sg>
e1f7b5
        Signed-off-by: valis <sec@valis.email>
e1f7b5
        Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com>
e1f7b5
        Reviewed-by: Victor Nogueira <victor@mojatatu.com>
e1f7b5
        Reviewed-by: Pedro Tammela <pctammela@mojatatu.com>
e1f7b5
        Reviewed-by: M A Ramdhan <ramdhan@starlabs.sg>
e1f7b5
        Link: https://lore.kernel.org/r/20230729123202.72406-3-jhs@mojatatu.com
e1f7b5
        Signed-off-by: Jakub Kicinski <kuba@kernel.org>
e1f7b5
e1f7b5
    Signed-off-by: Davide Caratti <dcaratti@redhat.com>
e1f7b5
e1f7b5
commit 86b6be644c207dd3f4b3ecf4975a771608f0cece
e1f7b5
Author: Davide Caratti <dcaratti@redhat.com>
e1f7b5
Date:   Wed Aug 9 15:23:37 2023 +0200
e1f7b5
e1f7b5
    net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
    Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2228703
e1f7b5
    CVE: CVE-2023-4128
e1f7b5
    Upstream Status: net.git commit 3044b16e7c6f
e1f7b5
e1f7b5
    commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
e1f7b5
    Author: valis <sec@valis.email>
e1f7b5
    Date:   Sat Jul 29 08:32:00 2023 -0400
e1f7b5
e1f7b5
        net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free
e1f7b5
e1f7b5
        When u32_change() is called on an existing filter, the whole
e1f7b5
        tcf_result struct is always copied into the new instance of the filter.
e1f7b5
e1f7b5
        This causes a problem when updating a filter bound to a class,
e1f7b5
        as tcf_unbind_filter() is always called on the old instance in the
e1f7b5
        success path, decreasing filter_cnt of the still referenced class
e1f7b5
        and allowing it to be deleted, leading to a use-after-free.
e1f7b5
e1f7b5
        Fix this by no longer copying the tcf_result struct from the old filter.
e1f7b5
e1f7b5
        Fixes: de5df63228fc ("net: sched: cls_u32 changes to knode must appear atomic to readers")
e1f7b5
        Reported-by: valis <sec@valis.email>
e1f7b5
        Reported-by: M A Ramdhan <ramdhan@starlabs.sg>
e1f7b5
        Signed-off-by: valis <sec@valis.email>
e1f7b5
        Signed-off-by: Jamal Hadi Salim <jhs@mojatatu.com>
e1f7b5
        Reviewed-by: Victor Nogueira <victor@mojatatu.com>
e1f7b5
        Reviewed-by: Pedro Tammela <pctammela@mojatatu.com>
e1f7b5
        Reviewed-by: M A Ramdhan <ramdhan@starlabs.sg>
e1f7b5
        Link: https://lore.kernel.org/r/20230729123202.72406-2-jhs@mojatatu.com
e1f7b5
        Signed-off-by: Jakub Kicinski <kuba@kernel.org>
e1f7b5
e1f7b5
    Signed-off-by: Davide Caratti <dcaratti@redhat.com>
e1f7b5
e1f7b5
Signed-off-by: Ryan Sullivan <rysulliv@redhat.com>
e1f7b5
---
e1f7b5
 net/sched/cls_fw.c    | 1 -
e1f7b5
 net/sched/cls_route.c | 1 -
e1f7b5
 net/sched/cls_u32.c   | 1 -
e1f7b5
 3 files changed, 3 deletions(-)
e1f7b5
e1f7b5
diff --git a/net/sched/cls_fw.c b/net/sched/cls_fw.c
e1f7b5
index e05043266620..57563d1bf7a0 100644
e1f7b5
--- a/net/sched/cls_fw.c
e1f7b5
+++ b/net/sched/cls_fw.c
e1f7b5
@@ -274,7 +274,6 @@ static int fw_change(struct net *net, struct sk_buff *in_skb,
e1f7b5
 			return -ENOBUFS;
e1f7b5
 
e1f7b5
 		fnew->id = f->id;
e1f7b5
-		fnew->res = f->res;
e1f7b5
 #ifdef CONFIG_NET_CLS_IND
e1f7b5
 		fnew->ifindex = f->ifindex;
e1f7b5
 #endif /* CONFIG_NET_CLS_IND */
e1f7b5
diff --git a/net/sched/cls_route.c b/net/sched/cls_route.c
e1f7b5
index d97c5bcdfa43..0bd48bd0bf9b 100644
e1f7b5
--- a/net/sched/cls_route.c
e1f7b5
+++ b/net/sched/cls_route.c
e1f7b5
@@ -501,7 +501,6 @@ static int route4_change(struct net *net, struct sk_buff *in_skb,
e1f7b5
 	if (fold) {
e1f7b5
 		f->id = fold->id;
e1f7b5
 		f->iif = fold->iif;
e1f7b5
-		f->res = fold->res;
e1f7b5
 		f->handle = fold->handle;
e1f7b5
 
e1f7b5
 		f->tp = fold->tp;
e1f7b5
diff --git a/net/sched/cls_u32.c b/net/sched/cls_u32.c
e1f7b5
index cc9398e10451..73e97f73447a 100644
e1f7b5
--- a/net/sched/cls_u32.c
e1f7b5
+++ b/net/sched/cls_u32.c
e1f7b5
@@ -864,7 +864,6 @@ static struct tc_u_knode *u32_init_knode(struct tcf_proto *tp,
e1f7b5
 	new->ifindex = n->ifindex;
e1f7b5
 #endif
e1f7b5
 	new->fshift = n->fshift;
e1f7b5
-	new->res = n->res;
e1f7b5
 	new->flags = n->flags;
e1f7b5
 	RCU_INIT_POINTER(new->ht_down, n->ht_down);
e1f7b5
 
e1f7b5
-- 
e1f7b5
2.41.0
e1f7b5
e1f7b5