๐Ÿ” CVE Alert

CVE-2022-50721

UNKNOWN 0.0

dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg The calling convention for pre_slave_sg is to return NULL on error and provide an error log to the system. Qcom-adm instead provide error pointer when an error occur. This indirectly cause kernel panic for example for the nandc driver that checks only if the pointer returned by device_prep_slave_sg is not NULL. Returning an error pointer makes nandc think the device_prep_slave_sg function correctly completed and makes the kernel panics later in the code. While nandc is the one that makes the kernel crash, it was pointed out that the real problem is qcom-adm not following calling convention for that function. To fix this, drop returning error pointer and return NULL with an error log.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5c9f8c2dbdbe53818bcde6aa6695e1331e5f841f < 5653bd0200944e5803fa8e32dc36aa49931312f9 5c9f8c2dbdbe53818bcde6aa6695e1331e5f841f < 9a041174c58a226e713f6cebd41eccec7a5cfa72 5c9f8c2dbdbe53818bcde6aa6695e1331e5f841f < b9d2140c3badf4107973ad77c5a0ec3075705c85
Linux / Linux
5.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5653bd0200944e5803fa8e32dc36aa49931312f9 git.kernel.org: https://git.kernel.org/stable/c/9a041174c58a226e713f6cebd41eccec7a5cfa72 git.kernel.org: https://git.kernel.org/stable/c/b9d2140c3badf4107973ad77c5a0ec3075705c85