We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-47671

can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path



Description

In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path In es58x_rx_err_msg(), if can->do_set_mode() fails, the function directly returns without calling netif_rx(skb). This means that the skb previously allocated by alloc_can_err_skb() is not freed. In other terms, this is a memory leak. This patch simply removes the return statement in the error branch and let the function continue. Issue was found with GCC -fanalyzer, please follow the link below for details.

Reserved 2025-04-16 | Published 2025-04-17 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

8537257874e949a59c834cecfd5a063e11b64b0b before 4f389e1276a5389c92cef860c9fde8e1c802a871
affected

8537257874e949a59c834cecfd5a063e11b64b0b before 7eb0881aec26099089f12ae850aebd93190b1dfe
affected

8537257874e949a59c834cecfd5a063e11b64b0b before d9447f768bc8c60623e4bb3ce65b8f4654d33a50
affected

Default status
affected

5.13
affected

Any version before 5.13
unaffected

5.14.19
unaffected

5.15.3
unaffected

5.16
unaffected

References

git.kernel.org/...c/4f389e1276a5389c92cef860c9fde8e1c802a871

git.kernel.org/...c/7eb0881aec26099089f12ae850aebd93190b1dfe

git.kernel.org/...c/d9447f768bc8c60623e4bb3ce65b8f4654d33a50

cve.org (CVE-2021-47671)

nvd.nist.gov (CVE-2021-47671)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-47671

Support options

Helpdesk Chat, Email, Knowledgebase