From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: Flexible endpoints use DIGs (from available non-flexible endpoints), so only non-flexible link encoders need to be freed. Otherwise, a double free issue may occur during amdgpu module unload. 2. Code Changes: - File: - Changes: - Removed the condition - Added the condition 3. Author and Commit Information: - Committer: Tim Huang - Commit Time: 2024-08-15 18:45:22 - Committer: Greg Kroah-Hartman - Commit Time: 2024-10-10 12:00:31 4. Review and Sign-off: - Reviewer: Rodrigo Siqueira - Sign-off: Tim Huang - Reviewer: Roman Li - Sign-off: Roman Li - Tester: Daniel Wheeler - Sign-off: Alex Deucher - Sign-off: Sasha Levin 5. Diffstat: - File: - Change Type: 1 file, 1 insertion, 1 deletion 6. Code Snippet: This information indicates that the vulnerability fixes a double free issue that could occur during amdgpu module unload, achieved by modifying the code in .