From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: net: dsa: mv88e6xxx: Fix out-of-bound access - Description: If an ATU (Address Translation Unit) violation is triggered by a CPU Load operation, the SPID (Source Port Identifier) may exceed DSA_MAX_PORTS (the size of the mv88e6xxx_chip_ports[] array). 2. Fix Details: - Patch File: Modified in . - Patch Content: - Patch Location: Inside the function. 3. Fix History: - Upstream Commit: 528876d867a23b5198022baf2e388052ca67c952 - Fixer: Joseph Huang - Reviewer: Andrew Lunn - Other Sign-offs: Jakub Kicinski and Sasha Levin 4. Patch Status: - Status: Merged - Merge Date: 2024-08-19 19:52:50 -0400 5. Patch File: - File Path: - File Content: Included in the patch code above. This information indicates that the vulnerability has been resolved by fixing out-of-bounds access issues in the mv88e6xxx chip, and the fix has been reviewed and merged into the upstream kernel.