Description: wifi: wilc1000: validate pairwise and authentication suite offsets References: https://lore.kernel.org/r/20221123153543.8568-2-philipturnbull@github.com Notes: bwh> The RSN parsing code was significantly refactored after 4.19 by bwh> commit 4e0b0f42c9c7 "staging: wilc1000: use struct to pack join bwh> parameters for FW, but I suspect it already had this bug. bwh> The vulnerable function would be in bwh> drivers/staging/wilc1000/host_interface.c Bugs: upstream: released (6.1-rc8) [cd21d99e595ec1d8721e1058dcdd4f1f7de1d793] 6.1-upstream-stable: N/A "Fixed before branch point" 5.10-upstream-stable: released (5.10.157) [7c6535fb4d67ea37c98a1d1d24ca33dd5ec42693] 4.19-upstream-stable: needed sid: released (6.0.12-1) 6.1-bookworm-security: N/A "Fixed before branch point" 5.10-bullseye-security: released (5.10.158-1) 4.19-buster-security: needed