{"id":"CVE-2021-47671","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path\n\nIn es58x_rx_err_msg(), if can-\u003edo_set_mode() fails, the function\ndirectly returns without calling netif_rx(skb). This means that the\nskb previously allocated by alloc_can_err_skb() is not freed. In other\nterms, this is a memory leak.\n\nThis patch simply removes the return statement in the error branch and\nlet the function continue.\n\nIssue was found with GCC -fanalyzer, please follow the link below for\ndetails.","modified":"2026-03-23T05:08:08.955021Z","published":"2025-04-17T18:15:43.933Z","related":["SUSE-SU-2025:01620-1","SUSE-SU-2025:01627-1","SUSE-SU-2025:01640-1","SUSE-SU-2025:1573-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/4f389e1276a5389c92cef860c9fde8e1c802a871"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7eb0881aec26099089f12ae850aebd93190b1dfe"},{"type":"FIX","url":"https://git.kernel.org/stable/c/d9447f768bc8c60623e4bb3ce65b8f4654d33a50"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.13"},{"fixed":"5.14.19"}]},{"events":[{"introduced":"5.15"},{"fixed":"5.15.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47671.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}