{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:23:14.931","vulnerabilities":[{"cve":{"id":"CVE-2026-23282","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-03-25T11:16:22.823","lastModified":"2026-03-25T15:41:33.977","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix oops due to uninitialised var in smb2_unlink()\n\nIf SMB2_open_init() or SMB2_close_init() fails (e.g. reconnect), the\niovs set @rqst will be left uninitialised, hence calling\nSMB2_open_free(), SMB2_close_free() or smb2_set_related() on them will\noops.\n\nFix this by initialising @close_iov and @open_iov before setting them\nin @rqst."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nsmb: cliente: corregir oops debido a una variable no inicializada en smb2_unlink()\n\nSi SMB2_open_init() o SMB2_close_init() falla (por ejemplo, reconexión), el conjunto de iovs @rqst quedará sin inicializar, por lo tanto, llamar a SMB2_open_free(), SMB2_close_free() o smb2_set_related() en ellos causará un oops.\n\nSolucionar esto inicializando @close_iov y @open_iov antes de establecerlos en @rqst."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/048efe129a297256d3c2088cf8d79515ff5ec864","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/86163b98891aa9800f6103252e5acc7bb98afb91","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/dc710c87af3341554d02d634ada1d2036c49a94a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}