{"api_version":"1","generated_at":"2026-04-19T01:10:48+00:00","cve":"CVE-2026-23367","urls":{"html":"https://cve.report/CVE-2026-23367","api":"https://cve.report/api/cve/CVE-2026-23367.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23367","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23367"},"summary":{"title":"wifi: radiotap: reject radiotap with unknown bits","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: radiotap: reject radiotap with unknown bits\n\nThe radiotap parser is currently only used with the radiotap\nnamespace (not with vendor namespaces), but if the undefined\nfield 18 is used, the alignment/size is unknown as well. In\nthis case, iterator->_next_ns_data isn't initialized (it's\nonly set for skipping vendor namespaces), and syzbot points\nout that we later compare against this uninitialized value.\n\nFix this by moving the rejection of unknown radiotap fields\ndown to after the in-namespace lookup, so it will really use\niterator->_next_ns_data only for vendor namespaces, even in\ncase undefined fields are present.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-03-25 11:16:36","updated_at":"2026-04-18 09:16:21"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/6f80f6a60f5d87e5de5fb2732751fce799991c24","name":"https://git.kernel.org/stable/c/6f80f6a60f5d87e5de5fb2732751fce799991c24","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448","name":"https://git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d","name":"https://git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/d1d1d3c50095928624a95b67a6d7ccc3a18f2215","name":"https://git.kernel.org/stable/c/d1d1d3c50095928624a95b67a6d7ccc3a18f2215","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781","name":"https://git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323","name":"https://git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0","name":"https://git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992","name":"https://git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23367","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23367","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 6f80f6a60f5d87e5de5fb2732751fce799991c24 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 d1d1d3c50095928624a95b67a6d7ccc3a18f2215 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 703fa979badbba83d31cd011606d060bfb8b0d1d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 129c8bb320a7cef692c78056ef8e89a2a12ba448 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 2a60c588d5d39ad187628f58395c776a97fd4323 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 2f8ceeba670610d66f77def32011f48de951d781 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 e664971759a0e5570b50c6592e58a7f97d55e992 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 33e5a2f776e331dc8a4379b6efb660d38f182d96 c854758abe0b8d86f9c43dc060ff56a0ee5b31e0 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 2.6.34","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 2.6.34 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.253 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.203 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.167 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.77 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.17 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.7 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"23367","cve":"CVE-2026-23367","epss":"0.000320000","percentile":"0.090980000","score_date":"2026-04-18","updated_at":"2026-04-19 00:10:43"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/wireless/radiotap.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"6f80f6a60f5d87e5de5fb2732751fce799991c24","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"d1d1d3c50095928624a95b67a6d7ccc3a18f2215","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"703fa979badbba83d31cd011606d060bfb8b0d1d","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"129c8bb320a7cef692c78056ef8e89a2a12ba448","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"2a60c588d5d39ad187628f58395c776a97fd4323","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"2f8ceeba670610d66f77def32011f48de951d781","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"e664971759a0e5570b50c6592e58a7f97d55e992","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"},{"lessThan":"c854758abe0b8d86f9c43dc060ff56a0ee5b31e0","status":"affected","version":"33e5a2f776e331dc8a4379b6efb660d38f182d96","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/wireless/radiotap.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"2.6.34"},{"lessThan":"2.6.34","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.253","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.203","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.167","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.77","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.17","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.7","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.253","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.203","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.167","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.77","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.17","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.7","versionStartIncluding":"2.6.34","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"2.6.34","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: radiotap: reject radiotap with unknown bits\n\nThe radiotap parser is currently only used with the radiotap\nnamespace (not with vendor namespaces), but if the undefined\nfield 18 is used, the alignment/size is unknown as well. In\nthis case, iterator->_next_ns_data isn't initialized (it's\nonly set for skipping vendor namespaces), and syzbot points\nout that we later compare against this uninitialized value.\n\nFix this by moving the rejection of unknown radiotap fields\ndown to after the in-namespace lookup, so it will really use\niterator->_next_ns_data only for vendor namespaces, even in\ncase undefined fields are present."}],"providerMetadata":{"dateUpdated":"2026-04-18T08:58:14.832Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/6f80f6a60f5d87e5de5fb2732751fce799991c24"},{"url":"https://git.kernel.org/stable/c/d1d1d3c50095928624a95b67a6d7ccc3a18f2215"},{"url":"https://git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d"},{"url":"https://git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448"},{"url":"https://git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323"},{"url":"https://git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781"},{"url":"https://git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992"},{"url":"https://git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0"}],"title":"wifi: radiotap: reject radiotap with unknown bits","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-23367","datePublished":"2026-03-25T10:27:49.068Z","dateReserved":"2026-01-13T15:37:46.003Z","dateUpdated":"2026-04-18T08:58:14.832Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-25 11:16:36","lastModifiedDate":"2026-04-18 09:16:21","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23367","Ordinal":"1","Title":"wifi: radiotap: reject radiotap with unknown bits","CVE":"CVE-2026-23367","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23367","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: radiotap: reject radiotap with unknown bits\n\nThe radiotap parser is currently only used with the radiotap\nnamespace (not with vendor namespaces), but if the undefined\nfield 18 is used, the alignment/size is unknown as well. In\nthis case, iterator->_next_ns_data isn't initialized (it's\nonly set for skipping vendor namespaces), and syzbot points\nout that we later compare against this uninitialized value.\n\nFix this by moving the rejection of unknown radiotap fields\ndown to after the in-namespace lookup, so it will really use\niterator->_next_ns_data only for vendor namespaces, even in\ncase undefined fields are present.","Type":"Description","Title":"wifi: radiotap: reject radiotap with unknown bits"}]}}}