{"id":"CVE-2026-23367","summary":"wifi: radiotap: reject radiotap with unknown bits","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: radiotap: reject radiotap with unknown bits\n\nThe radiotap parser is currently only used with the radiotap\nnamespace (not with vendor namespaces), but if the undefined\nfield 18 is used, the alignment/size is unknown as well. In\nthis case, iterator-\u003e_next_ns_data isn't initialized (it's\nonly set for skipping vendor namespaces), and syzbot points\nout that we later compare against this uninitialized value.\n\nFix this by moving the rejection of unknown radiotap fields\ndown to after the in-namespace lookup, so it will really use\niterator-\u003e_next_ns_data only for vendor namespaces, even in\ncase undefined fields are present.","modified":"2026-04-14T03:47:35.518330Z","published":"2026-03-25T10:27:49.068Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23367.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781"},{"type":"WEB","url":"https://git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23367.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23367"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"33e5a2f776e331dc8a4379b6efb660d38f182d96"},{"fixed":"703fa979badbba83d31cd011606d060bfb8b0d1d"},{"fixed":"129c8bb320a7cef692c78056ef8e89a2a12ba448"},{"fixed":"2a60c588d5d39ad187628f58395c776a97fd4323"},{"fixed":"2f8ceeba670610d66f77def32011f48de951d781"},{"fixed":"e664971759a0e5570b50c6592e58a7f97d55e992"},{"fixed":"c854758abe0b8d86f9c43dc060ff56a0ee5b31e0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23367.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.34"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.77"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23367.json"}}],"schema_version":"1.7.5"}