In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer If data_offset and data_length of smb_direct_data_transfer struct are invalid, out of bounds issue could happen. This patch validate data_offset and data_length field in recv_done.
https://git.kernel.org/stable/c/eb0378dde086363046ed3d7db7f126fc3f76fd70
https://git.kernel.org/stable/c/bdaab5c6538e250a9654127e688ecbbeb6f771d5
https://git.kernel.org/stable/c/8be498fcbd5b07272f560b45981d4b9e5a2ad885
https://git.kernel.org/stable/c/773fddf976d282ef059c36c575ddb81567acd6bc
https://git.kernel.org/stable/c/529b121b00a6ee3c88fb3c01b443b2b81f686d48
https://git.kernel.org/stable/c/5282491fc49d5614ac6ddcd012e5743eecb6a67c