In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix incorrect validation for num_aces field of smb_acl parse_dcal() validate num_aces to allocate posix_ace_state_array. if (num_aces > ULONG_MAX / sizeof(struct smb_ace *)) It is an incorrect validation that we can create an array of size ULONG_MAX. smb_acl has ->size field to calculate actual number of aces in request buffer size. Use this to check invalid num_aces.
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | Windows Server 2012 R2 |
| Linux | Linux | QAMSRV1M |
| Linux | Linux | 6.2.3.6 |
| Linux | Linux | n/a |