In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a3xx: fix error handling in a3xx_gpu_init()
These error paths returned 1 on failure, instead of a negative error
code. This would lead to an Oops in the caller. A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-22T06:19:39.506Z
Updated: 2024-11-04T12:06:05.179Z
Reserved: 2024-05-21T14:58:30.832Z
Link: CVE-2021-47447
Vulnrichment
Updated: 2024-08-04T05:39:59.478Z
NVD
Status : Awaiting Analysis
Published: 2024-05-22T07:15:09.897
Modified: 2024-05-22T12:46:53.887
Link: CVE-2021-47447
Redhat