Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames. Reference: https://github.com/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-47519
Hello, could we have a brief summary here and in the CVE page https://access.redhat.com/security/cve/CVE-2022-47519 why all RHEL versions are considered Not affected? Thank you, Jan