CVE-2026-23152
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/02/2026
Última modificación:
14/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: mac80211: correctly decode TTLM with default link map<br />
<br />
TID-To-Link Mapping (TTLM) elements do not contain any link mapping<br />
presence indicator if a default mapping is used and parsing needs to be<br />
skipped.<br />
<br />
Note that access points should not explicitly report an advertised TTLM<br />
with a default mapping as that is the implied mapping if the element is<br />
not included, this is even the case when switching back to the default<br />
mapping. However, mac80211 would incorrectly parse the frame and would<br />
also read one byte beyond the end of the element.



