From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. **Vulnerability Description**: - **Title**: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() - **Description**: When removing a resource from the vmci_resource_table, if the resource's handle and type are the same, but the resource's context and resource fields differ, a use-after-free vulnerability may occur. 2. **Trigger Conditions**: - When attempting to remove a resource, vmci_resource_remove() may fail to remove the intended resource, but the resource is still freed. - The vmci_resource_table continues to hold a pointer to the freed resource, leading to a use-after-free vulnerability. 3. **KASAN Report**: - KASAN reported a use-after-free error occurring at line 147 in the file drivers/misc/vmw_vmci/vmci_resource.c. 4. **Patch Content**: - The patch fixes the issue by adding a check for resource type during resource removal, ensuring that the resource type is also verified when removing a resource. 5. **Patch Application**: - The patch is applied to the file drivers/misc/vmw_vmci/vmci_resource.c, adding a check for resource type during removal. 6. **Patch Impact**: - The patch fixes the vulnerability introduced by commit bc63dedb7d46 ("VMCI: resource object implementation."). 7. **Reporting and Sign-offs**: - Reported by George Kennedy, signed off by David Fernandez Gonzalez. - The patch was signed off by Greg Kroah-Hartman. This information indicates that the patch addresses a use-after-free vulnerability by adding a resource type check during resource removal, preventing the vulnerability from occurring.