VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2022-50651

CVE-2022-50651

Description

In the Linux kernel, the following vulnerability has been resolved:

ethtool: eeprom: fix null-deref on genl_info in dump

The similar fix as commit 46cdedf2a0fa ("ethtool: pse-pd: fix null-deref on genl_info in dump") is also needed for ethtool eeprom.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-pointer dereference vulnerability in the Linux kernel's ethtool eeprom dump handler can be triggered by a crafted request, leading to a denial of service.

Vulnerability

Overview

The Linux kernel's ethtool subsystem for dumping EEPROM data via ethtool contains a null-pointer dereference flaw. The function responsible for handling the dump operations fails to properly validate the genl_info pointer before using it, mirroring a similar issue previously fixed in the PSE-PD dump handler [1]. This oversight means that under specific conditions, the pointer can be NULL, leading to a kernel crash when the code attempts to access its members.

Exploitation

An attacker with local access and the ability to send crafted netlink messages to the ethtool interface can trigger this vulnerability. No special privileges beyond basic user access are required to initiate the dump operation that hits the vulnerable code path. The attack surface is limited to local users, as the ethtool netlink interface is not exposed remotely.

Impact

Successful exploitation results in a kernel NULL-pointer dereference, causing a system crash (denial of service). This can be used to disrupt services or force a reboot. There is no evidence of privilege escalation or code execution from this bug.

Mitigation

The fix has been applied in the Linux kernel stable tree as commit 9d9effca9d7d [1]. Users should update to a kernel version containing this commit or a later stable release that includes the backport. No workaround is available; the only mitigation is to apply the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.