From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: Flexible endpoints use DIGs (from available rigid endpoints), so only rigid links need to be freed. Otherwise, a double free issue may occur during amdgpu module unload. 2. Code Changes: - File: - Changes: - Removed code within the block. - Added a new block, updating the link encoder resource tracking variables inside. 3. Author and Commit Information: - Committer: Tim Huang - Commit Time: 2024-08-15 18:45:22 - Committer: Greg Kroah-Hartman - Commit Time: 2024-10-10 11:57:33 4. Review and Sign-offs: - Reviewer: Rodrigo Siqueira - Sign-off: Tim Huang - Reviewer: Roman Li - Sign-off: Roman Li - Tester: Daniel Wheeler - Sign-off: Alex Deucher - Sign-off: Sasha Levin 5. Diffstat: - File: - Change Type: 1 file changed, 1 insertion(+), 1 deletion(-) 6. Diff Content: - Removed code from the block. - Added a new block, updating link encoder resource tracking variables within. This information indicates that the vulnerability was fixed by modifying the code in to prevent a double free issue during the unload of the amdgpu module.