In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.
https://git.kernel.org/stable/c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65c
https://git.kernel.org/stable/c/a9940dcbe5cb92482c04efc7341039ddf7dbf607
https://git.kernel.org/stable/c/22b7c1c619d808aec4cad3dc42103345e370d107