From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: bpf: Check validity of link->type in bpf_link_show_fdinfo() - Description: If a newly added link type does not call BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] in bpf_link_show_fdinfo() may lead to an out-of-bounds access. 2. Fix Measures: - Code Change: Added a check for link->type in the bpf_link_show_fdinfo() function. - Warning: If the link type has not called BPF_LINK_TYPE(), a warning message is printed within the function. 3. Signatures: - Submitter: Hou Tao - Submission Time: 2024-10-24 09:35:58 +0800 - Merger: Greg Kroah-Hartman - Merge Time: 2024-11-17 15:08:58 +0100 4. Patch Source: - Link: https://lore.kernel.org/bpf/20241024013558.1135167-3-houtao@huaweicloud.com 5. Code Changes: - File: kernel/bpf/syscall.c - Lines Changed: 14 lines modified - Type: 9 insertions, 5 deletions 6. Diffstat: - Displays detailed information about file changes, including the number of inserted and deleted lines. This information helps us understand the vulnerability's background, the applied fix, and the specific details of the code modifications.