From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - KASAN (Kernel Address Space Layout Randomization) reports that the GPU metrics table, allocated in , is not large enough, causing an out-of-bounds write during the operation in . 2. Vulnerability Location: - The vulnerability occurs in the file . 3. Fix Measures: - The fix involves modifying the initialization of to ensure sufficient memory allocation and prevent out-of-bounds writes. - The updated code changes the initialization of from to . 4. Code Change Differences: - The code difference lies in the initialization of , changing from a function call to directly using . 5. Fixer: - The fixer is Tvrtko Ursulin, with the Signed-off-by email: . 6. Related Patch and Contacts: - This patch fixes the issue . - The fixer’s contacts include Mario Limonciello, Evan Quan, Wenyou Yang, Alex Deucher, etc. This information helps understand the vulnerability context, the applied fix, and relevant contacts for further research and validation.