From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: net: dsa: mv88e6xxx: Fix out-of-bound access - Description: If an ATU (Address Translation Unit) violation is triggered by a CPU Load operation, the SPID (Source Port Identifier) may exceed DSA_MAX_PORTS (the size of the mv88e6xxx_chip_ports[] array). 2. Fix Details: - Fixed File: - Fix Code: - Reason for Fix: Resolves the out-of-bounds array access issue. 3. Fix History: - Upstream Commit: 528876d867a23b5198022baf2e388052ca67c952 - Fix Commit: a10d0337115a6d223a1563d853d4455f05d0b2e3 - Author: Joseph Huang - Commit Date: 2024-08-19 19:52:50 -0400 - Committer: Greg Kroah-Hartman - Commit Date: 2024-09-04 13:23:33 +0200 4. Related Patches and Sign-offs: - Related Patch: 75c05a74e745 - Sign-offs: - Signed-off-by: Joseph Huang - Signed-off-by: Jakub Kicinski - Signed-off-by: Sasha Levin 5. Links: - Upstream Link: https://patch-msgid.link/20240819235251.1331763-1-Joseph.Huang@garmin.com This information indicates that the vulnerability was caused by an out-of-bounds access to SPID triggered by an ATU violation. The fix involves checking whether SPID is within bounds in the array and updating the corresponding value in the array if valid.