๐Ÿ” CVE Alert

CVE-2021-47671

LOW 3.3

can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path

CVSS Score
3.3
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). This means that the skb previously allocated by alloc_can_err_skb() is not freed. In other terms, this is a memory leak. This patch simply removes the return statement in the error branch and let the function continue. Issue was found with GCC -fanalyzer, please follow the link below for details.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 17, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new low vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8537257874e949a59c834cecfd5a063e11b64b0b < 4f389e1276a5389c92cef860c9fde8e1c802a871 8537257874e949a59c834cecfd5a063e11b64b0b < 7eb0881aec26099089f12ae850aebd93190b1dfe 8537257874e949a59c834cecfd5a063e11b64b0b < d9447f768bc8c60623e4bb3ce65b8f4654d33a50
Linux / Linux
5.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4f389e1276a5389c92cef860c9fde8e1c802a871 git.kernel.org: https://git.kernel.org/stable/c/7eb0881aec26099089f12ae850aebd93190b1dfe git.kernel.org: https://git.kernel.org/stable/c/d9447f768bc8c60623e4bb3ce65b8f4654d33a50