From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Vulnerability Type: Memory Leak - Location: function in the file - Cause: The function fails to properly manage reference counting, leading to premature release of the GEM object after use, which results in use-after-free. 2. Impact: - Affected Scope: Linux kernel stable branch ( ) - Affected Versions: Upstream versions 3. Fixes: - Fix Description: Corrected reference counting management in the function to ensure GEM objects are not released prematurely after use. - Patch Location: The fix is applied in , specifically addressing reference counting in the function. 4. Reporting and Verification: - Reporter: Rob Clark - Verifiers: Daniel Vetter and Javier Martinez Canillas - Verification Link: https://patchwork.freedesktop.org/patch/msgid/20221130185748.357410-2-robdc Clark@gmail.com 5. Patch Status: - Status: Merged into upstream This information helps in understanding the nature, scope, and remediation of the vulnerability, enabling better assessment and response.