In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2closecachedfid() findorcreatecacheddir() could grab a new reference after krefput() had seen the refcount drop to zero but before cfidlistlock is acquired in smb2closecachedfid(), leading to use-after-free. Switch to krefputlock() so cfidrelease() is called with cfidlistlock held, closing that gap.