A small, easily overlooked change in the Linux SMB client — a single check that skips sessions already tearing down — closed a deceptively dangerous use‑after‑free (UAF) bug in the CIFS/SMB debug path that could, in practice, let an attacker repeatedly deny availability or cause kernel...