Description In the Linux kernel, the following vulnerability has been resolved:
smb: client: Add check for next_buffer in receive_encrypted_standard()
Add check for the return value of cifs_buf_get() and cifs_small_buf_get()
in receive_encrypted_standard() to prevent null pointer dereference.
CVSS vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Exploitability: 1.8 | Impact: 3.6 Attack Vector: Local
Complexity: Low
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: High
Affected Packages8 packages Show 3 more packages
🔴 Vulnerability Details25 OSV linux-azure, linux-azure-6.8, linux-azure-nvidia vulnerabilities ↗ 2025-09-03 ▶ OSV linux-gke, linux-hwe-6.8, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-raspi vulnerabilities ↗ 2025-08-28 ▶ OSV linux-raspi-realtime vulnerabilities ↗ 2025-08-26 ▶ OSV linux-oracle, linux-oracle-6.8 vulnerabilities ↗ 2025-08-21 ▶ OSV linux-aws-6.8, linux-gcp, linux-gcp-6.8, linux-gkeop, linux-ibm, linux-ibm-6.8 vulnerabilities ↗ 2025-08-20 ▶ Show 20 more
📋 Vendor Advisories26 Ubuntu Linux kernel (Azure) vulnerabilities ↗ 2025-09-03 ▶ Ubuntu Linux kernel vulnerabilities ↗ 2025-08-28 ▶ Ubuntu Linux kernel (Raspberry Pi Real-time) vulnerabilities ↗ 2025-08-26 ▶ Ubuntu Linux kernel (Oracle) vulnerabilities ↗ 2025-08-21 ▶ Ubuntu Linux kernel vulnerabilities ↗ 2025-08-20 ▶ Show 21 more