CVE-2026-31626
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()<br />
<br />
Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using<br />
uninitialized data.<br />
<br />
Smatch warns that only 6 bytes are copied to this 8-byte (u64)<br />
variable, leaving the last two bytes uninitialized:<br />
<br />
drivers/staging/rtl8723bs/core/rtw_security.c:1308 rtw_BIP_verify()<br />
warn: not copying enough bytes for &#39;&le_tmp64&#39; (8 vs 6 bytes)<br />
<br />
Initializing the variable at the start of the function fixes this<br />
warning and ensures predictable behavior.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/8c964b82a4e97ec7f25e17b803ee196009b38a57
- https://git.kernel.org/stable/c/b487a7754d874230299d5a9c2710ec4df8b2ed8a
- https://git.kernel.org/stable/c/c2026c6b603ebec52f55015496703fe79077accf
- https://git.kernel.org/stable/c/c65ee4d3be5df395e48afbcd0946dd5fce4338a9
- https://git.kernel.org/stable/c/d5b8f5f8d6fc09a8af5ed139c688660f578ed732
- https://git.kernel.org/stable/c/ef74ce5f0bc0e53ce702d8a794f3957884a26efc



