From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - Title: wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading - Description: The expected C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM is not implemented in the driver, but it can lead to out-of-bounds reading. The fix is to remove this ID. 2. Vulnerability Type: - Vulnerability ID: 1598775 ("Out-of-bounds read") - Vulnerability Type: Out-of-bounds read 3. Fix Status: - Fix Patch: Patch ID: 56310dddb50b190b3390fcd974ae455d0a516bd2 - Fix Patch Link: https://patch.msys.link/20240809072012.84152-4-pkshih@realtek.com 4. Related Patch: - Related Patch ID: ff53fce5c78b - Related Patch Description: wifi: rtw89: wow: update latest PTK GTK info to mac80211 after resume 5. Author: - Committer: Ping-Ke Shih - Commit Time: 2024-08-09 15:20:09 +0800 6. Patch Content: - Patch File Path: drivers/net/wireless/realtek/rtw89/mac.h - Patch Content: 7. Patch Status: - Status: Merged - Merge Time: 2024-08-16 19:26:23 +0800 This information helps understand the vulnerability's background, the fix process, and the specific content of the patch.