Description
In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie

The current code checks 'i + 5 < in_len' at the end of the if statement.
However, it accesses 'in_ie[i + 5]' before that check, which can lead
to an out-of-bounds read. Move the length check to the beginning of the
conditional to ensure the index is within bounds before accessing the
array.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An out-of-bounds read occurs in the staging rtl8723bs wireless driver when processing the Wireless Multimedia (WMM) Information Element. The code accesses in_ie[i + 5] before verifying that i + 5 is less than the buffer length, enabling an attacker to read data beyond the intended bounds. This flaw can expose kernel memory contents but does not provide code execution or privilege escalation. The weakness is identified as a classic out-of-bounds read (CWE-805).

Affected Systems

All Linux kernel systems that ship the staging rtl8723bs driver and contain a kernel version earlier than the commit 12cc6e8f8d4245b7b5a408c6fc8ab1d098d67020 are affected. Distributions that include the vulnerable driver in their default kernel should consider this a risk until the upstream patch is applied.

Risk and Exploitability

Exploitation requires the delivery of a crafted WMM Information Element to a rtl8723bs device, which typically means an attacker must be within listening range of the wireless interface. Based on the description, it is inferred that the attack vector is a maliciously crafted wireless packet transmitted to the device. Because the vulnerability only allows memory reads, it does not grant arbitrary code execution or privilege escalation. The EPSS score is unavailable, the vulnerability is not listed in the CISA KEV catalog, and no CVSS score is provided, so the overall risk should be considered moderate to high in environments that handle sensitive data.

Generated by OpenCVE AI on May 9, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes commit 12cc6e8f8d4245b7b5a408c6fc8ab1d098d67020 or later.
  • If an immediate kernel update is not viable, disable the rtl8723bs driver by blacklisting it or shutting down the wireless interface to prevent the vulnerable code from running.
  • Monitor kernel logs for anomalous driver activity, and enforce wireless access controls or network segmentation to limit exposure to rogue WMM frames.

Generated by OpenCVE AI on May 9, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie The current code checks 'i + 5 < in_len' at the end of the if statement. However, it accesses 'in_ie[i + 5]' before that check, which can lead to an out-of-bounds read. Move the length check to the beginning of the conditional to ensure the index is within bounds before accessing the array.
Title staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:32.646Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43386

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:49.933

Modified: 2026-05-08T15:16:49.933

Link: CVE-2026-43386

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43386 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:30:17Z

Weaknesses