๐Ÿ” CVE Alert

CVE-2026-23152

UNKNOWN 0.0

wifi: mac80211: correctly decode TTLM with default link map

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped. Note that access points should not explicitly report an advertised TTLM with a default mapping as that is the implied mapping if the element is not included, this is even the case when switching back to the default mapping. However, mac80211 would incorrectly parse the frame and would also read one byte beyond the end of the element.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 14, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
702e80470a3359ce02b3f846f48f6db4ac7fd837 < aabc36857bd39da65fe2d047bfaf63a0a09917d4 702e80470a3359ce02b3f846f48f6db4ac7fd837 < 1eab33aa63c993685dd341e03bd5b267dd7403fa
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/aabc36857bd39da65fe2d047bfaf63a0a09917d4 git.kernel.org: https://git.kernel.org/stable/c/1eab33aa63c993685dd341e03bd5b267dd7403fa