CVE-2026-23152

CWE-125Out-of-bounds Read7 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped. Note that access points should not explicitly report an advertised TTLM with a default mapping as that is the implied mapping if the element is not included, this is even the case when switching back to the default mappi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.76.18.9+1
CVEListV5linux/linux702e80470a3359ce02b3f846f48f6db4ac7fd837aabc36857bd39da65fe2d047bfaf63a0a09917d4+2
Debianlinux< 6.18.9-1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hqxw-2v34-r7g3: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping2026-02-14
CVEList
wifi: mac80211: correctly decode TTLM with default link map2026-02-14
OSV
CVE-2026-23152: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (T2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: wifi: mac80211: correctly decode TTLM with default link map2026-02-14
Debian
CVE-2026-23152: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23152 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23152 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io