In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with concurrent opens in rename(2) Besides sending the rename request to the server, the rename process also involves closing any deferred close, waiting for outstanding I/O to complete as well as marking all existing open handles as deleted to prevent them from deferring closes, which increases the race window for potential concurrent opens on the target file. Fix this by unhashing the dentry in advance to prevent any concurrent opens on the target.
https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747
https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c
https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358
https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2
https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2