We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() 1. The size of the response packet is not validated. 2. The response buffer is not freed. Resolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.
Reserved 2024-11-19 | Published 2024-11-19 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/9c98ee7ea463a838235e7a0e35851b38476364f2
git.kernel.org/...c/45a628911d3c68e024eed337054a0452b064f450
git.kernel.org/...c/3f45d590ccbae6dfd6faef54efe74c30bd85d3da
git.kernel.org/...c/64d63557ded6ff3ce72b18ab87a6c4b1b652161c
git.kernel.org/...c/3eb986c64c6bfb721950f9666a3b723cf65d043f
git.kernel.org/...c/9480c3045f302f43f9910d2d556d6cf5a62c1822
git.kernel.org/...c/07a6e3b78a65f4b2796a8d0d4adb1a15a81edead
Support options