In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard() Add check for the return value of cifs_buf_get() and cifs_small_buf_get() in receive_encrypted_standard() to prevent null pointer dereference.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025031210-CVE-2025-21844-a1cc@gregkh/T