Bug 2468186 (CVE-2026-43386) - CVE-2026-43386 kernel: staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie
Summary: CVE-2026-43386 kernel: staging: rtl8723bs: fix potential out-of-bounds read i...
Keywords:
Status: NEW
Alias: CVE-2026-43386
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-08 15:03 UTC by OSIDB Bzimport
Modified: 2026-05-08 21:32 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-08 15:03:39 UTC
In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie

The current code checks 'i + 5 < in_len' at the end of the if statement.
However, it accesses 'in_ie[i + 5]' before that check, which can lead
to an out-of-bounds read. Move the length check to the beginning of the
conditional to ensure the index is within bounds before accessing the
array.


Note You need to log in before you can comment on or make changes to this bug.