From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: If the function partially fails due to memory allocation failure or fault injection (as reported by syzybot [1]), new pages must be compared with existing pages to prevent memory leaks. 2. Fix Details: - Fix Method: The issue is resolved by adding an check on . - Code Changes: Modifications were made in the file , with the specific code change as follows: 3. Reporting and Fixing Process: - Reporter: syzybot+242ee56aaa9585553766@syzkaller.appspotmail.com - Fixer: Gao Xiang - Reviewers: Chunhai Guo and Sandeep Dhavale - Signer: Gao Xiang 4. Related Links: - Report Link: https://lore.kernel.org/r/20240820085619.1375963-1-hsiangkao@linux.alibaba.com - Source Code Link: https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com This information indicates that the vulnerability is related to the erofs filesystem and addresses out-of-bounds access issues that could occur when memory allocation fails or during fault injection. The fix involves adding additional checks in the code to ensure that page handling does not result in out-of-bounds access.