CVE-2022-50710
Description
In the Linux kernel, the following vulnerability has been resolved:
ice: set tx_tstamps when creating new Tx rings via ethtool
When the user changes the number of queues via ethtool, the driver allocates new rings. This allocation did not initialize tx_tstamps. This results in the tx_tstamps field being zero (due to kcalloc allocation), and would result in a NULL pointer dereference when attempting a transmit timestamp on the new ring.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ice driver, failing to initialize tx_tstamps on new Tx rings created via ethtool can lead to a NULL pointer dereference when processing transmit timestamps.
Vulnerability
Overview
CVE-2022-50710 is a NULL pointer dereference vulnerability in the Linux kernel's Intel Ethernet Connection (ice) driver. The root cause is that when a user changes the number of transmit queues via ethtool, the driver allocates new Tx rings using kcalloc, which zeroes the memory. However, the tx_tstamps field within the ring structure is not explicitly initialized. This leaves tx_tstamps as NULL, and any subsequent attempt to use the ring for hardware transmit timestamping will dereference this NULL pointer, causing a kernel crash [1][2].
Exploitation
Conditions
An attacker would need the ability to trigger a reconfiguration of the network queues via ethtool on a system using the ice driver. This typically requires local access with sufficient privileges (e.g., CAP_NET_ADMIN) to run ethtool commands. The attack surface is limited to systems where the ice driver is in use and where an unprivileged or malicious user can invoke the queue change operation. No network-based exploitation is possible; the vulnerability is triggered locally through a legitimate administrative interface.
Impact
Successful exploitation results in a denial of service (DoS) through a kernel NULL pointer dereference, leading to a system crash or hang. The impact is limited to availability; there is no evidence of privilege escalation or data corruption from this bug. The vulnerability affects the ice driver in the Linux kernel prior to the inclusion of the fix commits.
Mitigation
The fix was applied in the Linux kernel stable tree via commits [1] and [2], which ensure that tx_tstamps is properly initialized when new Tx rings are allocated. Users should update to a kernel version containing these commits. No workaround is available other than avoiding the use of ethtool to change queue counts on affected systems.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
4624f03a027f213180cb88a7b9eb5fff6b0e7b3b173745c8cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.