ACK/cmnt: [CVE-2017-7895][T/Y SRU] Fix for CVE-2017-7895

Stefan Bader stefan.bader at
Tue Jun 27 14:47:41 UTC 2017

On 27.06.2017 14:16, Po-Hsu Lin wrote:
> For Yakkety, the fix (13bf9fbf) requires another cherry-pick (db44bac4)
> to tidy up the struct access first. As the patch is just make it easier
> to access the variable, the possible impact should be minimum.
> For Trusty, it will need two more patches in advance. Including one
> cherry-pick (d40aa337) to move assignments out of an if conditional,
> a backport (6625d091) to take only the change for fs/nfsd/nfs3xdr.c
> to ensures the total length of the incoming NFS WRITE request. And
> then followed by those two cherry-picks for Yakkety.
> This CVE was mark as needed for T/Y.
> [Regression Potential]
> The only possible impact is to the RDMA transport, since the backport
> does not include the change to fix its read logic in
> /net/sunrpc/xprtrdma/svc_rdma_recvfrom.c
> However, the aforementioned read logic belongs to the XDR round-up logic,
> which has not landed in Trusty at all (fcbeced5), thus the impact should
> be minimum.

Patch #1 for T is just re-arranging code without functional change, #2 sounds
like a reasonable fixup on its own, the shared #3 or (#1 for Y) again without
functional change. So feels ok.

Acked-by: Stefan Bader <stefan.bader at>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <>

More information about the kernel-team mailing list