In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in smb2closecached_fid()
findorcreatecacheddir() could grab a new reference after krefput() had seen the refcount drop to zero but before cfidlistlock is acquired in smb2closecachedfid(), leading to use-after-free.
Switch to krefputlock() so cfidrelease() is called with cfidlist_lock held, closing that gap.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40328.json",
"cna_assigner": "Linux"
}