In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing connections try to use smb_direct_wq as a NULL pointer.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025090547-CVE-2025-39692-7452@gregkh/T