{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T21:26:38.502","vulnerabilities":[{"cve":{"id":"CVE-2021-47668","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-04-17T18:15:43.623","lastModified":"2025-04-21T18:41:27.987","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_restart: fix use after free bug\n\nAfter calling netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is accessed\nafter the netif_rx_ni() in:\n      stats->rx_bytes += cf->len;\n\nReordering the lines solves the issue."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: dev: can_restart: fix use after free bug. Tras llamar a netif_rx_ni(skb), desreferenciar skb no es seguro. En particular, se accede al cf can_frame, que crea un alias de memoria skb, después de netif_rx_ni() en: stats-&gt;rx_bytes += cf-&gt;len;. Reordenar las líneas soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.31","versionEndExcluding":"4.4.254","matchCriteriaId":"B3F43128-3AF7-45BD-8292-35295A09235B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.5","versionEndExcluding":"4.9.254","matchCriteriaId":"828B5BA1-E6D5-4D92-A2FD-7186908DE07C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10","versionEndExcluding":"4.14.218","matchCriteriaId":"31F3AA41-450C-45A7-A1D3-FB2D8C212890"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.171","matchCriteriaId":"E048F4A6-F5E6-41BF-BCD6-49274CA46915"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.93","matchCriteriaId":"3F19E9ED-75CE-4576-98F5-2746C9189696"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.11","matchCriteriaId":"B62A8CB5-77B4-40A9-8B60-AF691EC1FB99"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*","matchCriteriaId":"18B1C9CE-F7E4-426B-A770-79F86AB5CC38"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*","matchCriteriaId":"7A70E596-2EF7-4651-B2EF-2CEE31DB6893"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*","matchCriteriaId":"18C82C96-2853-4DFE-93AD-F6E59B4129CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*","matchCriteriaId":"A330B043-47EA-4D06-82BF-153A1735FC11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/03f16c5075b22c8902d2af739969e878b0879c94","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/08ab951787098ae0b6c0364aeea7a8138226f234","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/260925a0b7d2da5449f8ecfd02c1405e0c8a45b8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/593c072b7b3c4d7044416eb039d9ad706bedd67a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/92668d28c7e6a7a2ba07df287669ffcdf650c421","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/ac48ef15826e83f4206c47add61072e8fc76d328","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/bbc6847b9b8978b520f62fbc7c68c54ef0f8d282","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}