CVE-2026-23166
NULL Pointer Dereference in Linux ice Driver Causes Kernel Crash
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | From 6.10.10 (inc) to 6.11 (exc) |
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.9 (exc) |
| linux | linux_kernel | From 6.11.1 (inc) to 6.12.69 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's ice driver, specifically in the function ice_vsi_set_napi_queues. It occurs during the system resume from suspend when a certain pointer (rings[q_idx]->q_vector) is NULL, causing the kernel to crash.
The issue happens because the code did not check if the pointer was NULL before using it, leading to a crash. The fix involved adding NULL pointer checks to prevent this crash during resume.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash during system resume from suspend, resulting in a denial of service. Systems using the affected Intel Ethernet Controller E810-XXV for SFP may experience unexpected crashes when resuming from suspend, potentially leading to system instability or downtime.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for NULL pointer dereference errors related to the ice driver during system resume from suspend.
Specifically, after executing a suspend command such as 'systemctl suspend' or 'rtcwake', check the kernel log for messages indicating a NULL pointer dereference or BUG in the ice_vsi_set_napi_queues function.
You can use the following commands to detect this issue:
- Suspend the system using: systemctl suspend
- Or use rtcwake to suspend and wake the system: rtcwake -m mem -s <seconds>
- Check kernel logs for errors with: dmesg | grep -i 'NULL pointer dereference'
- Or check for ice driver related errors: dmesg | grep -i 'ice_vsi_set_napi_queues'
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, avoid suspending the system while using the affected Intel Ethernet Controller E810-XXV with the ice driver on kernel version 6.18.
If suspending is necessary, ensure that the system is updated with the patch that adds NULL pointer checks in the ice_vsi_set_napi_queues() function to prevent crashes.
Alternatively, disable the affected network adapter or use a different kernel version where this issue is resolved.