From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: If a client sends simultaneous SMB operations to ksmbd, it may consume excessive memory, leading to an OOM (Out of Memory) issue. ksmbd has a credit mechanism, but it cannot handle this problem. This patch adds a check: if the credit exceeds the maximum credit, it assumes that each SMB request consumes at least one credit. 2. Patch Content: - Files Modified: Involves four files: , , , and . - Changes Made: - In , a check for was added. - In , a check for was added, and corresponding handling was implemented in the function. 3. Patch Application: - Patch File: Applied in the file . 4. Patch Author and Submitter: - Author: Namjae Jeon - Submitter: Greg Kroah-Hartman 5. Patch Status: - Status: Submitted to upstream. 6. Impact of the Patch: - Impact: Resolves the issue of excessive memory consumption caused by simultaneous SMB operations. Based on this information, we understand that the primary purpose of this patch is to address the problem of excessive memory consumption due to simultaneous SMB operations by adding a credit check in ksmbd to prevent OOM issues.