{
  "threat_severity" : "Moderate",
  "public_date" : "2025-12-24T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: Linux kernel: Denial of Service in ice driver via uninitialized transmit rings",
    "id" : "2425001",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2425001"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-476",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nice: set tx_tstamps when creating new Tx rings via ethtool\nWhen the user changes the number of queues via ethtool, the driver\nallocates new rings. This allocation did not initialize tx_tstamps. This\nresults in the tx_tstamps field being zero (due to kcalloc allocation), and\nwould result in a NULL pointer dereference when attempting a transmit\ntimestamp on the new ring.", "A flaw was found in the Linux kernel's ice network driver. A local user, by changing the number of transmit queues using the ethtool utility, can trigger an issue where newly allocated transmit rings are not properly initialized. This can lead to a null pointer dereference, causing a system crash and a Denial of Service (DoS)." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2023-11-14T00:00:00Z",
    "advisory" : "RHSA-2023:7077",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-513.5.1.el8_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50710\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50710\nhttps://lore.kernel.org/linux-cve-announce/2025122421-CVE-2022-50710-3f0d@gregkh/T" ],
  "name" : "CVE-2022-50710",
  "mitigation" : {
    "value" : "The vulnerability requires a local user to have privileges to use the ethtool utility and an ice network adapter. To mitigate this issue, restrict access to the ethtool utility to trusted administrators. If the ice network driver is not in use, consider blacklisting the ice kernel module to prevent it from loading.\nTo blacklist the ice module:\n1. Create a file `/etc/modprobe.d/blacklist-ice.conf` with the following content:\n`blacklist ice`\n2. Regenerate the initramfs:\n`dracut -f -v` (for RHEL 7/8) or `dracut -f -v --kver $(uname -r)` (for RHEL 9)\n3. Reboot the system for the changes to take effect.\nThis mitigation may impact network functionality if the ice driver is required for network operations.",
    "lang" : "en:us"
  },
  "csaw" : false
}