From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: net/mlx5e: Fix use-after-free when reverting termination table - Description: Fixes a use-after-free issue occurring when reverting a termination table. When a termination table with multiple destinations is reverted and the reversion of the second destination's termination table fails, the driver reverts the usage of the termination table but does not reset the allocation in . The fix involves resetting the allocation to NULL. 2. Patch History: - Commit ID: 52c795af04441d76f565c4634f893e5b553df2ae - Commit Time: 2022-11-14 20:04:29 +0200 - Committer: Roi Dayan - Committer: Saeed Mahameed - Parent Commit: 3f5769a074c13d8f08455e40586600419e02a880 - Parent Commit Time: 2022-11-24 00:03:21 -0800 3. Patch File: - File Path: drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads_termtbl.c - File Content: 4. Patch Status: - Status: Applied - Patch Size: 2 lines inserted, 0 lines deleted 5. Patch Application Time: - Application Time: 2024-10-23 17:14:38 +0000 6. Patch Application Tool: - Tool: cgit 1.2.3-korg (git 2.43.0) This information indicates that the patch resolves a potential use-after-free vulnerability by resetting the relevant allocation during termination table reversion.