CVE-2022-50721 — Information Exposure via Error Message in Linux
Severity
5.1MEDIUM
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
The calling convention for pre_slave_sg is to return NULL on error and
provide an error log to the system. Qcom-adm instead provide error
pointer when an error occur. This indirectly cause kernel panic for
example for the nandc driver that checks only if the pointer returned by
device_prep_slave_sg is not NULL. Returning an error pointer makes nandc
think the …
Affected Packages4 packages
▶CVEListV5linux/linux5c9f8c2dbdbe53818bcde6aa6695e1331e5f841f — 5653bd0200944e5803fa8e32dc36aa49931312f9+3
🔴Vulnerability Details
3GHSA▶
GHSA-9gcm-5rwh-p2jv: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
The calling↗2025-12-24
OSV▶
CVE-2022-50721: In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg The calling co↗2025-12-24