From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Issue: In the function, if any error occurs after , is freed twice. - Fix: This issue is resolved by setting to NULL after the first free, preventing the double-free. 2. Code Changes: - File: - Change Location: Line 922 - Change Content: 3. Author and Commit Information: - Committer: Zijun Hu - Commit Date: July 27, 2024 - Commit Message: Fix double-free issue in function. 4. Signed-off-by: - Committer: Zijun Hu - Link: https://lore.kernel.org/r/20240727-bus_register_fix-v1-1-fed8dd0dba7a@quicinc.com 5. Patch Link: - Committer: Greg Kroah-Hartman - Link: https://lore.kernel.org/r/20240727-bus_register_fix-v1-1-fed8dd0dba7a@quicinc.com This information indicates that the vulnerability stems from improper error handling in the function, leading to a double-free condition. The fix involves setting to NULL after the first free to prevent the second free from occurring.