CVE-2022-47520
wifi: wilc1000: validate pairwise and authentication suite offsets
References
Notes
bwh> The RSN parsing code was significantly refactored after 4.19 by
bwh> commit 4e0b0f42c9c7 "staging: wilc1000: use struct to pack join
bwh> parameters for FW, but I suspect it already had this bug.
bwh> The vulnerable function would be in
bwh> drivers/staging/wilc1000/host_interface.c
Bugs
Status
| Branch |
Status |
| 4.19-buster-security |
needed
|
| 4.19-upstream-stable |
needed
|
| 5.10-bullseye-security |
released (5.10.158-1)
|
| 5.10-upstream-stable |
released (5.10.157) [7c6535fb4d67ea37c98a1d1d24ca33dd5ec42693]
|
| 6.1-bookworm-security |
N/A "Fixed before branch point"
|
| 6.1-upstream-stable |
N/A "Fixed before branch point"
|
| 6.6-upstream-stable |
unknown
|
| 6.8-upstream-stable |
unknown
|
| sid |
released (6.0.12-1)
|
| upstream |
released (6.1-rc8) [cd21d99e595ec1d8721e1058dcdd4f1f7de1d793]
|