From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Vulnerability Type: netfilter: nf_tables: prevent nf_skb_duplicated corruption - Description: The functions or may cause the variable to be written in an unsafe manner when processing IPv4 or IPv6 packets. 2. Fix Measures: - Fix Method: In addition to disabling prefetching (hinted by the splat), soft interrupts must also be disabled. - Fix Code: New code has been added to and functions to ensure safe writes to the variable. 3. Patch Code: - Patch Location: Files and . - Patch Content: - In , code has been added to check the variable and return or jump if necessary. - Similar operations have been performed in . 4. Patch Status: - Status: Merged into the master branch. - Merge Time: 2024-10-23 17:14:37 +0000. 5. Reporting and Confirmation: - Reporters: syzbot, Eric Dumazet, Pablo Neira Ayuso, and Sasha Levin. - Confirmers: syzbot, Eric Dumazet, Pablo Neira Ayuso, and Sasha Levin. This information indicates that the vulnerability has been fixed and merged into the Linux kernel's master branch. The fix primarily involves adding additional checks and handling logic within the and functions to ensure safe writes to the variable.