From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Vulnerability Name: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() - Description: In the function, the number of elements in the array ( ) does not match the size of the ADC divider array ( ). This could lead to an out-of-bounds array read. 2. Fix Measures: - Fix Code: Change the condition from to to prevent out-of-bounds array access. 3. Fix History: - Upstream Commit: c7f06284a6427475e3df742215535ec3f6cd9662 - Author: Dan Carpenter - Commit Time: 2024-09-11 10:39:15 +0300 - Commit Message: Fixed error in ep93xx: clock: convert in-place to COMMON_CLK. 4. Sign-offs: - Sign-off: Dan Carpenter - Sign-off: Alexander Sverdlin - Sign-off: Nikita Shubin - Sign-off: Arnd Bergmann - Sign-off: Sasha Levin 5. Patch File: - Patch File Path: arch/arm/mach-ep93xx/clock.c - Patch File Content: 6. Patch Status: - Patch Status: Applied; the patch has been submitted to the Linux kernel stable branch. This information helps us understand the vulnerability's background, mitigation measures, and detailed patch content, enabling better assessment and handling of the vulnerability.