In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]wifi: wilc1000: avoid buffer overflow in WID string configuration[EOL][EOL]Fix the following copy overflow warning identified by Smatch checker.[EOL][EOL] drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()[EOL] error: '__memcpy()' 'cfg->s[i]->str' copy overflow (512 vs 65537)[EOL][EOL]This patch introduces size check before accessing the memory buffer.[EOL]The checks are base on the WID type of received data from the firmware.[EOL]For WID string configuration, the size limit is determined by individual[EOL]element size in 'struct wilc_cfg_str_vals' that is maintained in 'len' field[EOL]of 'struct wilc_cfg_str'.