In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2026050832-CVE-2026-43378-d7e3@gregkh/T