VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50710

CVE-2022-50710

Description

In the Linux kernel, the following vulnerability has been resolved:

ice: set tx_tstamps when creating new Tx rings via ethtool

When the user changes the number of queues via ethtool, the driver allocates new rings. This allocation did not initialize tx_tstamps. This results in the tx_tstamps field being zero (due to kcalloc allocation), and would result in a NULL pointer dereference when attempting a transmit timestamp on the new ring.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ice driver, failing to initialize tx_tstamps on new Tx rings created via ethtool can lead to a NULL pointer dereference when processing transmit timestamps.

Vulnerability

Overview

CVE-2022-50710 is a NULL pointer dereference vulnerability in the Linux kernel's Intel Ethernet Connection (ice) driver. The root cause is that when a user changes the number of transmit queues via ethtool, the driver allocates new Tx rings using kcalloc, which zeroes the memory. However, the tx_tstamps field within the ring structure is not explicitly initialized. This leaves tx_tstamps as NULL, and any subsequent attempt to use the ring for hardware transmit timestamping will dereference this NULL pointer, causing a kernel crash [1][2].

Exploitation

Conditions

An attacker would need the ability to trigger a reconfiguration of the network queues via ethtool on a system using the ice driver. This typically requires local access with sufficient privileges (e.g., CAP_NET_ADMIN) to run ethtool commands. The attack surface is limited to systems where the ice driver is in use and where an unprivileged or malicious user can invoke the queue change operation. No network-based exploitation is possible; the vulnerability is triggered locally through a legitimate administrative interface.

Impact

Successful exploitation results in a denial of service (DoS) through a kernel NULL pointer dereference, leading to a system crash or hang. The impact is limited to availability; there is no evidence of privilege escalation or data corruption from this bug. The vulnerability affects the ice driver in the Linux kernel prior to the inclusion of the fix commits.

Mitigation

The fix was applied in the Linux kernel stable tree via commits [1] and [2], which ensure that tx_tstamps is properly initialized when new Tx rings are allocated. Users should update to a kernel version containing these commits. No workaround is available other than avoiding the use of ethtool to change queue counts on affected systems.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.