Impact
A null pointer dereference occurs in the rtl8723bs staging driver of the Linux kernel when the variable pwlan is passed to rtw_free_network_nolock() without a null check. The missing check causes the driver to dereference a NULL pointer, which can trigger a kernel panic and force the system into an unexpected reboot, disrupting availability of the host machine. The vulnerability does not directly grant confidentiality or integrity compromise, but a compromised or unstable operating environment can affect critical services running on the impacted device.
Affected Systems
The issue affects any Linux system that includes the rtl8723bs driver from the staging tree. As the attack is tied to the wireless driver, machines with Realtek 8723BS or similar wireless adapters that load this driver are at risk. The advisory does not list specific kernel versions, so the assumption is that earlier kernel releases that bundled the unpatched rtl8723bs module are vulnerable until the commit introducing the fix is applied.
Risk and Exploitability
No CVSS score or EPSS data is currently available, and the vulnerability is not listed in the CISA KEV catalog. Despite the lack of quantified metrics, a kernel crash could expose the system to denial of service, which is a serious impact for services that rely on uninterrupted network connectivity. The likely attack vector is local: an attacker with the ability to interact with the wireless stack (e.g., by sending crafted frames or manipulating network configuration) could trigger the fault. Because the driver resides in kernel space, a successful exploitation would result in a kernel panic rather than privilege escalation, but still provides a powerful denial of service mechanism for local attackers.
OpenCVE Enrichment