Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet. Reference: https://github.com/torvalds/linux/commit/cd21d99e595ec1d8721e1058dcdd4f1f7de1d793
Hello, could we have a brief summary here and in the CVE page https://access.redhat.com/security/cve/CVE-2022-47520 why all RHEL versions are considered Not affected? Thank you, Jan