From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Vulnerability Name: ksmbd: check outstanding simultaneous SMB operations - Description: If a client sends simultaneous SMB operations to ksmbd, it may consume excessive memory, leading to an OOM (Out of Memory) issue. ksmbd has a credit mechanism, but it cannot handle this problem. This patch adds a check: if credits exceed the maximum credit limit, it assumes each SMB request consumes at least one credit. 2. Patch Content: - Files Modified: Involves four files: , , , and . - Changes Made: - In , a check for was added. - In , the function was modified to check whether exceeds the maximum credit. - In , a check for was added. 3. Patch Author: - Author: Namjae Jeon - Patch Description: Namjae Jeon reported the issue and submitted the patch. 4. Patch Status: - Status: Merged into upstream. 5. Patch Details: - Patch ID: 0a77d947f599b1f39065015bec99390d0c0022ee - Commit Time: November 4, 2024, 13:43:06 +0900 - Committer: Greg Kroah-Hartman This information indicates that the patch was developed to fix the memory exhaustion issue in ksmbd when handling simultaneous SMB operations, by enforcing a credit-based check to prevent OOM conditions.