From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Issue: There is a risk of out-of-bounds read in the function. - Cause: The value of comes from user input and lacks boundary checking. 2. Fix Measures: - Fix Code: A boundary check for was added inside the statement. - Fix Objective: To ensure that the value of does not exceed the range of the CPU bitmap. 3. Fix History: - Upstream Commit: - Fix Commit: ("net: mvneta: Fix the CPU choice in mvneta_percpu_elect") 4. Author and Signed-off-by: - Author: Dan Carpenter - Signed-off-by: Dan Carpenter , David S. Miller , Sasha Levin 5. File Changes: - File Path: - Change Content: Boundary check code was added to the function. 6. Diffstat: - File Change Statistics: 1 file changed, 3 insertions, 0 deletions. This information indicates that the vulnerability was fixed by adding boundary checks for user input in the function, thereby preventing the risk of out-of-bounds reads.