CVE-2026-23152

Source
https://cve.org/CVERecord?id=CVE-2026-23152
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23152.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23152
Downstream
Related
Published
2026-02-14T16:01:20.379Z
Modified
2026-04-02T17:30:10.005032222Z
Summary
wifi: mac80211: correctly decode TTLM with default link map
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: correctly decode TTLM with default link map

TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped.

Note that access points should not explicitly report an advertised TTLM with a default mapping as that is the implied mapping if the element is not included, this is even the case when switching back to the default mapping. However, mac80211 would incorrectly parse the frame and would also read one byte beyond the end of the element.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23152.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
702e80470a3359ce02b3f846f48f6db4ac7fd837
Fixed
aabc36857bd39da65fe2d047bfaf63a0a09917d4
Fixed
1eab33aa63c993685dd341e03bd5b267dd7403fa

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23152.json"