From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: net: dsa: mv88e6xxx: Fix out-of-bound access - Description: If an ATU (Address Translation Unit) violation is triggered by a CPU Load operation, the SPID (Source Port Identifier) may exceed DSA_MAX_PORTS (the size of the mv88e6xxx_chip_ports[] array). 2. Fix Measures: - Patch Code: A check was added in the file to ensure SPID does not exceed the array bounds. 3. Fix History: - Upstream Commit: 528876d867a23b5198022baf2e388052ca67c952 - Fix Commit: d39f5be62f098fe367d672b4dd4bc4b2b80e08e7 - Author: Joseph Huang - Commit Time: 2024-08-19 19:52:50 -0400 - Committer: Greg Kroah-Hartman - Commit Time: 2024-09-04 13:15:00 +0200 4. Fix Scope: - File Path: drivers/net/dsa/mv88e6xxx/global1_atu.c - File Changes: 1 file changed, 2 insertions, 1 deletion 5. Related Patches and Sign-offs: - Related Patch: 75c05a74e745 - Sign-offs: Joseph Huang, Andrew Lunn, Jakub Kicinski, Sasha Levin 6. Links: - Upstream Link: https://patch-msgid.link/20240819235251.1331763-1-Joseph.Huang@garmin.com This information indicates that the vulnerability has been fixed, with detailed fix history and related patches available.