Description
In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix null dereference in find_network

The variable pwlan has the possibility of being NULL when passed into
rtw_free_network_nolock() which would later dereference the variable.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A null pointer dereference occurs in the rtl8723bs staging driver of the Linux kernel when the variable pwlan is passed to rtw_free_network_nolock() without a null check. The missing check causes the driver to dereference a NULL pointer, which can trigger a kernel panic and force the system into an unexpected reboot, disrupting availability of the host machine. The vulnerability does not directly grant confidentiality or integrity compromise, but a compromised or unstable operating environment can affect critical services running on the impacted device.

Affected Systems

The issue affects any Linux system that includes the rtl8723bs driver from the staging tree. As the attack is tied to the wireless driver, machines with Realtek 8723BS or similar wireless adapters that load this driver are at risk. The advisory does not list specific kernel versions, so the assumption is that earlier kernel releases that bundled the unpatched rtl8723bs module are vulnerable until the commit introducing the fix is applied.

Risk and Exploitability

No CVSS score or EPSS data is currently available, and the vulnerability is not listed in the CISA KEV catalog. Despite the lack of quantified metrics, a kernel crash could expose the system to denial of service, which is a serious impact for services that rely on uninterrupted network connectivity. The likely attack vector is local: an attacker with the ability to interact with the wireless stack (e.g., by sending crafted frames or manipulating network configuration) could trigger the fault. Because the driver resides in kernel space, a successful exploitation would result in a kernel panic rather than privilege escalation, but still provides a powerful denial of service mechanism for local attackers.

Generated by OpenCVE AI on May 6, 2026 at 13:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that contains the rtl8723bs driver fix
  • If an update is not immediately possible, unload or disable the rtl8723bs module to eliminate the crash risk
  • Continuously monitor system logs for kernel panic messages to detect attempts to trigger the crash

Generated by OpenCVE AI on May 6, 2026 at 13:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix null dereference in find_network The variable pwlan has the possibility of being NULL when passed into rtw_free_network_nolock() which would later dereference the variable.
Title staging: rtl8723bs: fix null dereference in find_network
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:38.541Z

Reserved: 2026-05-01T14:12:55.990Z

Link: CVE-2026-43159

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:33.853

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T13:45:04Z

Weaknesses