{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T15:00:31.661","vulnerabilities":[{"cve":{"id":"CVE-2026-23302","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-03-25T11:16:25.923","lastModified":"2026-04-27T14:16:30.323","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: annotate data-races around sk->sk_{data_ready,write_space}\n\nskmsg (and probably other layers) are changing these pointers\nwhile other cpus might read them concurrently.\n\nAdd corresponding READ_ONCE()/WRITE_ONCE() annotations\nfor UDP, TCP and AF_UNIX."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nnet: anotar condiciones de carrera de datos alrededor de sk-&gt;sk_{data_ready,write_space}\n\nskmsg (y probablemente otras capas) están cambiando estos punteros mientras otras CPUs podrían leerlos concurrentemente.\n\nAñadir las correspondientes anotaciones READ_ONCE()/WRITE_ONCE() para UDP, TCP y AF_UNIX."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/27fccdbcbbfc4651b6f66756e6fa3f52e051ec23","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/2ef2b20cf4e04ac8a6ba68493f8780776ff84300","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/7ad01905831c815520f1b0486336a03bb7420465","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/c494448bb522bbbb63096540eb2319101a0480ab","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f17c1c4acbe2bd702abce73a847a04a196fab2c5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}