First published: Fri May 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't set the MFP flag for the GTK The firmware doesn't need the MFP flag for the GTK, it can even make the firmware crash. in case the AP is configured with: group cipher TKIP and MFPC. We would send the GTK with cipher = TKIP and MFP which is of course not possible.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.6.23 | 6.6.23 |
redhat/kernel | <6.7.11 | 6.7.11 |
redhat/kernel | <6.8.2 | 6.8.2 |
redhat/kernel | <6.9 | 6.9 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27434 is considered a high-severity vulnerability due to the potential for system instability and crashes.
To fix CVE-2024-27434, update the Linux kernel to version 6.6.23, 6.7.11, 6.8.2, 6.9, or the specified versions for Debian's linux packages.
CVE-2024-27434 affects users of specific versions of the Linux kernel from Red Hat and Debian.
CVE-2024-27434 addresses an issue with the MFP flag in the iwlwifi driver that can cause firmware crashes.
Yes, CVE-2024-27434 is particularly relevant for systems configured with group cipher TKIP and MFPC.