In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in is_valid_oplock_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
https://git.kernel.org/stable/c/69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29
https://git.kernel.org/stable/c/494c91e1e9413b407d12166a61b84200d4d54fac
https://git.kernel.org/stable/c/16d58c6a7db5050b9638669084b63fc05f951825
https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2