From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - Issue: When using HIP08, is freed before the call. During this period, users can still release MRs, causing to be freed while still in use, leading to a Use-After-Free (UAF) vulnerability. - Fix: Move the freeing of to after the call to resolve this issue. 2. Patch Information: - Patch ID: 70f92521584f - Patch Description: "RDMA/hns: Use the reserved loopback QPs to free MR before destroying MPT" - Patch Author: wenglianfa - Patch Contributor: Junxian Huang 3. Patch Link: - Patch Link 4. Patch File: - File Path: - File Content: 5. Patch Diff: - File Path: - Diff Content: This information indicates that the patch fixes the issue where is freed before is called when using HIP08, thereby preventing the UAF vulnerability.