CVE-2026-43387
Buffer Overflow in Linux Kernel RTL8723BS Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | rtl8723bs | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's rtl8723bs staging driver. It involves improper validation of data in the function rtw_get_ie_ex(). Specifically, the code does not sufficiently check the length of the data before processing it, which can lead to out-of-bounds reads.
The issue was addressed by improving the validation of the data length in the rtw_get_ie_ex() function, similar to a previous fix for a related out-of-bounds read in the rtw_get_ie() parser.
How can this vulnerability impact me? :
An out-of-bounds read vulnerability like this can potentially lead to information disclosure or cause the system to behave unexpectedly, such as crashing or exposing sensitive memory contents.
Since this vulnerability is in a kernel driver, exploitation could affect system stability or security, depending on how the driver is used and the environment in which the kernel operates.