CVE-2026-22978

In the Linux kernel, the following vulnerability has been resolved: wifi: avoid kernel-infoleak from struct iw_point struct iw_point has a 32bit hole on 64bit arches. struct iw_point { void __user *pointer; /* Pointer to the data (in user space) */ __u16 length; /* number of fields or size in bytes */ __u16 flags; /* Optional params */ }; Make sure to zero the structure to avoid disclosing 32bits of kernel data to user space.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*

History

26 Feb 2026, 20:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/024f71a57d563fbe162e528c8bf2d27e9cac7c7b - () https://git.kernel.org/stable/c/024f71a57d563fbe162e528c8bf2d27e9cac7c7b - Patch
References () https://git.kernel.org/stable/c/21cbf883d073abbfe09e3924466aa5e0449e7261 - () https://git.kernel.org/stable/c/21cbf883d073abbfe09e3924466aa5e0449e7261 - Patch
References () https://git.kernel.org/stable/c/442ceac0393185e9982323f6682a52a53e8462b1 - () https://git.kernel.org/stable/c/442ceac0393185e9982323f6682a52a53e8462b1 - Patch
References () https://git.kernel.org/stable/c/a3827e310b5a73535646ef4a552d53b3c8bf74f6 - () https://git.kernel.org/stable/c/a3827e310b5a73535646ef4a552d53b3c8bf74f6 - Patch
References () https://git.kernel.org/stable/c/d21ec867d84c9f3a9845d7d8c90c9ce35dbe48f8 - () https://git.kernel.org/stable/c/d21ec867d84c9f3a9845d7d8c90c9ce35dbe48f8 - Patch
References () https://git.kernel.org/stable/c/d943b5f592767b107ba8c12a902f17431350378c - () https://git.kernel.org/stable/c/d943b5f592767b107ba8c12a902f17431350378c - Patch
References () https://git.kernel.org/stable/c/e3c35177103ead4658b8a62f41e3080d45885464 - () https://git.kernel.org/stable/c/e3c35177103ead4658b8a62f41e3080d45885464 - Patch
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3

23 Jan 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 16:15

Updated : 2026-02-26 20:17


NVD link : CVE-2026-22978

Mitre link : CVE-2026-22978

CVE.ORG link : CVE-2026-22978


JSON object : View

Products Affected

linux

  • linux_kernel