CVE-2022-50710

Source
https://cve.org/CVERecord?id=CVE-2022-50710
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50710.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50710
Downstream
Related
Published
2025-12-24T10:55:23.918Z
Modified
2026-03-12T03:26:49.879910Z
Summary
ice: set tx_tstamps when creating new Tx rings via ethtool
Details

In the Linux kernel, the following vulnerability has been resolved:

ice: set tx_tstamps when creating new Tx rings via ethtool

When the user changes the number of queues via ethtool, the driver allocates new rings. This allocation did not initialize txtstamps. This results in the txtstamps field being zero (due to kcalloc allocation), and would result in a NULL pointer dereference when attempting a transmit timestamp on the new ring.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50710.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ea9b847cda647b9849b0b9fa0447e876a1ac62e1
Fixed
624f03a027f2b18647cc4f1a7a81920a1e4e0201
Fixed
13180cb88a7be5ee389f65f6ab9f78e46f7722b2
Fixed
9eb5fff6b0e78819c758892282da5faa915724d0
Fixed
b3b173745c8cab1e24d6821488b60abed3acb24d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50710.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50710.json"