CVE-2026-43387
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
12/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
staging: rtl8723bs: properly validate the data in rtw_get_ie_ex()<br />
<br />
Just like in commit 154828bf9559 ("staging: rtl8723bs: fix out-of-bounds<br />
read in rtw_get_ie() parser"), we don&#39;t trust the data in the frame so<br />
we should check the length better before acting on it
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/35969c3a208a07cb8642301df5869c34e2db7071
- https://git.kernel.org/stable/c/6d62fa548387e159a21ea95132c09bfc96d336ed
- https://git.kernel.org/stable/c/740bca8bbdb707c0e4bb11e3316deb2f04fc7ce1
- https://git.kernel.org/stable/c/8097a48c606a9306281ea7bd73bf2afc97553733
- https://git.kernel.org/stable/c/821f7d759fb2de33c5e5b0c4981181c4d0c3e9b1
- https://git.kernel.org/stable/c/9a4cd4c37593cc8b8d28f9a6732b490a8032006a
- https://git.kernel.org/stable/c/ac38856092b4c994f94343251b30520bdeb7f475
- https://git.kernel.org/stable/c/f0109b9d3e1e455429279d602f6276e34689750a



