In the Linux kernel, the following vulnerability has been resolved: ksmbd: check outstanding simultaneous SMB operations If Client send simultaneous SMB operations to ksmbd, It exhausts too much memory through the "ksmbd_work_cache”. It will cause OOM issue. ksmbd has a credit mechanism but it can't handle this problem. This patch add the check if it exceeds max credits to prevent this problem by assuming that one smb request consumes at least one credit.
https://git.kernel.org/stable/c/e257ac6fe138623cf59fca8898abdf659dbc8356
https://git.kernel.org/stable/c/1f993777275cbd8f74765c4f9d9285cb907c9be5
https://git.kernel.org/stable/c/0a77d947f599b1f39065015bec99390d0c0022ee