From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: ASoC: soc-pcm: Add NULL check in BE reparenting - Description: Add a NULL check in the dpcm_be_reparent API to handle kernel NULL pointer dereference errors. The issue was discovered during fuzz testing. 2. Author: - Submitter: Srinivasa Rao Mandadapu - Submission Time: 2022-11-22 12:01:13 +0530 3. Fixer: - Submitter: Greg Kroah-Hartman - Submission Time: 2022-12-14 11:40:48 +0100 4. Patch File: - File Path: sound/soc/soc-pcm.c - File Content: 5. Patch Status: - Status: Fixed - Patch Size: 2 lines of code 6. Patch Submission Time: 2022-12-14 11:40:48 +0100 7. Patch Author: Greg Kroah-Hartman 8. Patch Description: The patch adds a NULL check in the dpcm_be_reparent API to address kernel NULL pointer dereference errors. 9. Patch Link: Upstream patch submission link: https://lore.kernel.org/r/1669098673-29703-1-git-send-email-quic_srivasam@quicinc.com 10. Patch Signatures: - Signer: Srinivasa Rao Mandadapu - Signer: Mark Brown - Signer: Sasha Levin This information helps us understand the vulnerability's background, the fix process, and the specific content of the patch.