CVE-2022-50700Signal Handler Race Condition in Linux

Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare scenario where copy engine hardware is sending a copy complete interrupt to the host driver while still processing the buffer that the driver has sent, this is leading into an SMMU fault triggering kernel panic. This is happening on copy engine channel 3 (CE3) where the driver normally enqueues WMI commands to the firmware. Upon receiving a copy c

Affected Packages4 packages

Linuxlinux/linux_kernel4.18.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linuxd390509bdf501c9c8c6e61248e4bc9314c86d854c4bedc3cda09d896c92adcdb6b62aa93b0c47a8a+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
wifi: ath10k: Delay the unmapping of the buffer2025-12-24
GHSA
GHSA-7rvm-m8gm-c79m: In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare2025-12-24
OSV
CVE-2022-50700: In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare s2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: wifi: ath10k: Delay the unmapping of the buffer2025-12-24
Debian
CVE-2022-50700: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath10...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50700 Impact, Exploitability, and Mitigation Steps | Wiz