We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). This means that the skb previously allocated by alloc_can_err_skb() is not freed. In other terms, this is a memory leak. This patch simply removes the return statement in the error branch and let the function continue. Issue was found with GCC -fanalyzer, please follow the link below for details.
Reserved 2025-04-16 | Published 2025-04-17 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/4f389e1276a5389c92cef860c9fde8e1c802a871
git.kernel.org/...c/7eb0881aec26099089f12ae850aebd93190b1dfe
git.kernel.org/...c/d9447f768bc8c60623e4bb3ce65b8f4654d33a50
Support options