CVE-2026-23367

medium

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: radiotap: reject radiotap with unknown bits The radiotap parser is currently only used with the radiotap namespace (not with vendor namespaces), but if the undefined field 18 is used, the alignment/size is unknown as well. In this case, iterator->_next_ns_data isn't initialized (it's only set for skipping vendor namespaces), and syzbot points out that we later compare against this uninitialized value. Fix this by moving the rejection of unknown radiotap fields down to after the in-namespace lookup, so it will really use iterator->_next_ns_data only for vendor namespaces, even in case undefined fields are present.

References

https://git.kernel.org/stable/c/e664971759a0e5570b50c6592e58a7f97d55e992

https://git.kernel.org/stable/c/d1d1d3c50095928624a95b67a6d7ccc3a18f2215

https://git.kernel.org/stable/c/c854758abe0b8d86f9c43dc060ff56a0ee5b31e0

https://git.kernel.org/stable/c/703fa979badbba83d31cd011606d060bfb8b0d1d

https://git.kernel.org/stable/c/6f80f6a60f5d87e5de5fb2732751fce799991c24

https://git.kernel.org/stable/c/2f8ceeba670610d66f77def32011f48de951d781

https://git.kernel.org/stable/c/2a60c588d5d39ad187628f58395c776a97fd4323

https://git.kernel.org/stable/c/129c8bb320a7cef692c78056ef8e89a2a12ba448

Details

Source: Mitre, NVD

Published: 2026-03-25

Updated: 2026-04-24

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00024