In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Apr 24, 2026
to the GitHub Advisory Database
•
Updated Apr 27, 2026
Description
Published by the National Vulnerability Database
Apr 24, 2026
Published to the GitHub Advisory Database
Apr 24, 2026
Last updated
Apr 27, 2026
In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
Initialize le_tmp64 to zero in rtw_BIP_verify() to prevent using
uninitialized data.
Smatch warns that only 6 bytes are copied to this 8-byte (u64)
variable, leaving the last two bytes uninitialized:
drivers/staging/rtl8723bs/core/rtw_security.c:1308 rtw_BIP_verify()
warn: not copying enough bytes for '&le_tmp64' (8 vs 6 bytes)
Initializing the variable at the start of the function fixes this
warning and ensures predictable behavior.
References