[LTS 8.8] netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_… #325
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
[LTS 8.8]
CVE-2023-42753
VULN-6667
Problem
https://nvd.nist.gov/vuln/detail/CVE-2023-42753
Original:
https://www.openwall.com/lists/oss-security/2023/09/22/10
Solution
The fix in mainline is given in 050d91c. All official backports have the same form. The fix is already present in Rockys CBR 7.9 (b0f9309), LTS 8.6 (fba0aaf) and LTS 9.4 (ab90fdc, ported by RedHat), all in the same form. It applies to LTS 8.8 smoothly as well.
kABI check: passed
Boot test: passed
boot-test.log
Kselftests: passed relative
Coverage
net
(exceptreuseaddr_conflict
,udpgso_bench.sh
,gro.sh
,ip_defrag.sh
,udpgro_fwd.sh
,reuseport_addr_any.sh
,xfrm_policy.sh
,txtimestamp.sh
),netfilter
(exceptnft_trans_stress.sh
)Following the discussion on Slack, and having established already what seems to be a set of stable tests for the LTS 8.8 version (no flappy results) - the only remaining reason for running full selftests routine for the last two months - a test run was done this time for the subsystems most likely affected by the change only.
Reference
kselftests–ciqlts8_8–run1.log
kselftests–ciqlts8_8–run2.log
Patch
kselftests–ciqlts8_8-CVE-2023-42753–run1.log
kselftests–ciqlts8_8-CVE-2023-42753–run2.log
Comparison
The test results are the same in the reference and patched kernel (presenting full results comparison)
Specific tests: could not replicate
An attempt was made to test the change specifically for the patched vulnerability. The CVE author included a proof of concept program at https://www.openwall.com/lists/oss-security/2023/09/22/10/1. Unfortunately, the reported errors could not have been reproduced using this tool. The program was compiled and run on the reference kernel for two architectures
x86_64
andaarch64
, using kernel configuration withCONFIG_UBSAN
enabled. What was expected were UBSAN's array-index-out-of-bounds messages similar to those given at https://www.openwall.com/lists/oss-security/2023/09/22/10.Instead the program was finishing without errors and the machine kept working fine. The specific tests were then abandoned.