CVE-2021-47671

Source
https://cve.org/CVERecord?id=CVE-2021-47671
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47671.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-47671
Downstream
Related
Published
2025-04-17T18:15:43.933Z
Modified
2026-03-11T07:47:39.555296Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

can: etases58x: es58xrxerrmsg(): fix memory leak in error path

In es58xrxerrmsg(), if can->dosetmode() fails, the function directly returns without calling netifrx(skb). This means that the skb previously allocated by alloccanerr_skb() is not freed. In other terms, this is a memory leak.

This patch simply removes the return statement in the error branch and let the function continue.

Issue was found with GCC -fanalyzer, please follow the link below for details.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47671.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "5.13"
            },
            {
                "fixed": "5.14.19"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.15"
            },
            {
                "fixed": "5.15.3"
            }
        ]
    }
]