In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: rfi: fix potential response leaks If the rx payload length check fails, or if kmemdup() fails, we still need to free the command response. Fix that.
git.kernel.org/linus/06a093807eb7b5c5b29b6cff49f8174a4e702341
git.kernel.org/stable/c/06a093807eb7b5c5b29b6cff49f8174a4e702341
git.kernel.org/stable/c/28db0ae86cb91a4ab0e855cff779daead936b7d5
git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62
git.kernel.org/stable/c/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8
git.kernel.org/stable/c/f7f0e784894dfcb265f0f9fa499103b0ca7eabde
ubuntu.com/security/CVE-2024-35912
ubuntu.com/security/notices/USN-6893-1
ubuntu.com/security/notices/USN-6893-2
ubuntu.com/security/notices/USN-6893-3
ubuntu.com/security/notices/USN-6898-1
ubuntu.com/security/notices/USN-6898-2
ubuntu.com/security/notices/USN-6898-3
ubuntu.com/security/notices/USN-6898-4
ubuntu.com/security/notices/USN-6917-1
ubuntu.com/security/notices/USN-6918-1
ubuntu.com/security/notices/USN-6919-1
ubuntu.com/security/notices/USN-6927-1
www.cve.org/CVERecord?id=CVE-2024-35912