From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Issue: In the function, the path may be freed or reallocated, causing the previously saved to be potentially freed, thus triggering a use-after-free vulnerability. - Fix: Fixed the issue in and functions where was used directly as input, and also fixed the use of in the function. 2. Code Changes: - File: - Changes: - Removed code in and functions that used . - In , removed code using and replaced it with direct use of . 3. Author and Reviewers: - Author: Baokun Li - Reviewers: Jan Kara, Ojaswin Mujoo, Theodore Ts'o, Sasha Levin 4. Links: - Upstream Commit: Upstream commit 4e2524ba2ca5f54bdbb9e5153bea00421ef653f5 This information indicates that the vulnerability is related to the filesystem's function, and the fix addresses the use-after-free issue by modifying the relevant functions through code changes.