摘要:
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a3xx: fix error handling in a3xx_gpu_init()
These error paths returned 1 on failure, instead of a negative error
code. This would lead to an Oops in the caller. A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
安全等级: Low
公告ID: KylinSec-SA-2024-2480
发布日期: 2024年5月30日
关联CVE: CVE-2021-47447
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a3xx: fix error handling in a3xx_gpu_init()
These error paths returned 1 on failure, instead of a negative error
code. This would lead to an Oops in the caller. A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47447 | KY3.4-4A | kernel | Unaffected |
CVE-2021-47447 | KY3.4-5 | kernel | Unaffected |
CVE-2021-47447 | KY3.5.1 | kernel | Unaffected |
CVE-2021-47447 | V6 | kernel | Unaffected |