In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a3xx: fix error handling in a3xx_gpu_init() These error paths
returned 1 on failure, instead of a negative error code. This would lead to
an Oops in the caller. A second problem is that the check for “if (ret !=
-ENODATA)” did not work because “ret” was set to 1.
git.kernel.org/linus/3eda901995371d390ef82d0b6462f4ea8efbcfdf (5.15-rc6)
git.kernel.org/stable/c/3eda901995371d390ef82d0b6462f4ea8efbcfdf
git.kernel.org/stable/c/d59e44e7821a8f2bb6f2e846b9167397a5f01608
launchpad.net/bugs/cve/CVE-2021-47447
nvd.nist.gov/vuln/detail/CVE-2021-47447
security-tracker.debian.org/tracker/CVE-2021-47447
www.cve.org/CVERecord?id=CVE-2021-47447