wifi: radiotap: reject radiotap with unknown bits
Summary
| CVE | CVE-2026-23367 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:36 UTC |
| Updated | 2026-04-18 09:16:21 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: wifi: radiotap: reject radiotap with unknown bits The radiotap parser is currently only used with the radiotap namespace (not with vendor namespaces), but if the undefined field 18 is used, the alignment/size is unknown as well. In this case, iterator->_next_ns_data isn't initialized (it's only set for skipping vendor namespaces), and syzbot points out that we later compare against this uninitialized value. Fix this by moving the rejection of unknown radiotap fields down to after the in-namespace lookup, so it will really use iterator->_next_ns_data only for vendor namespaces, even in case undefined fields are present. |
Risk And Classification
EPSS: 0.000320000 probability, percentile 0.090980000 (date 2026-04-18)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 6f80f6a60f5d87e5de5fb2732751fce799991c24 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 d1d1d3c50095928624a95b67a6d7ccc3a18f2215 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 703fa979badbba83d31cd011606d060bfb8b0d1d git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 129c8bb320a7cef692c78056ef8e89a2a12ba448 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 2a60c588d5d39ad187628f58395c776a97fd4323 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 2f8ceeba670610d66f77def32011f48de951d781 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 e664971759a0e5570b50c6592e58a7f97d55e992 git | Not specified |
| CNA | Linux | Linux | affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 c854758abe0b8d86f9c43dc060ff56a0ee5b31e0 git | Not specified |
| CNA | Linux | Linux | affected 2.6.34 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.34 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.77 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.17 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.7 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/6f80f6a60f5d87e5de5fb2732751fce799991c24 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/d1d1d3c50095928624a95b67a6d7ccc3a18f2215 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.