CVE-2026-23370
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
24/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86: dell-wmi-sysman: Don&#39;t hex dump plaintext password data<br />
<br />
set_new_password() hex dumps the entire buffer, which contains plaintext<br />
password data, including current and new passwords. Remove the hex dump<br />
to avoid leaking credentials.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.1 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e6115c2f2facaed9593c16ad2e5accd487f5c52
- https://git.kernel.org/stable/c/411ba3cd837f7825c0e648e155bc505641f95854
- https://git.kernel.org/stable/c/5de34126fb2edf8ab7f25d677b132e92d8bf9ede
- https://git.kernel.org/stable/c/9bbb420f202834363e1e25435e49db0a385c2232
- https://git.kernel.org/stable/c/d1a196e0a6dcddd03748468a0e9e3100790fc85c
- https://git.kernel.org/stable/c/d78e74adc5cfff7afd9d03b9da8058a7e435f9bc
- https://git.kernel.org/stable/c/d9e785bd62d2ac23cf29a75dcfea8c8087fd3870



