CVE-2026-23353
NULL Pointer Dereference in Linux ice Driver Causes ethtool Crash
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.19.1 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 6.19 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a crash in the Linux kernel related to the ice network driver during the ethtool offline loopback test.
The crash occurs because the driver did not properly initialize the libeth component for the receive (rx) ring after converting ice to use a page pool.
Specifically, the kernel encounters a NULL pointer dereference leading to a crash when running the loopback test, due to missing initialization of a dummy q_vector that contains a napi struct needed by libeth.
The fix involved treating ICE_VSI_LB VSIs more like normal PF VSIs by providing this dummy q_vector to avoid the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when performing the ethtool offline loopback test on systems using the ice network driver.
A kernel crash can lead to system instability, downtime, and potential loss of data or network connectivity during the test.
However, the issue is specifically triggered by the loopback test and does not indicate a direct security breach or data compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes a crash in the Linux kernel when running the ethtool offline loopback test on the ice driver. Detection can be done by observing kernel crash logs or oops messages related to the ice driver during the ethtool loopback test.
You can attempt to detect the vulnerability by running the following command on a system using the ice driver:
- ethtool --test <interface> offline
If the system crashes or logs kernel oops messages referencing ice_alloc_rx_bufs or NULL pointer dereference in the ice driver, it indicates the presence of this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where the ice driver properly initializes the rx ring for the ethtool offline loopback test.
Immediate mitigation steps include:
- Avoid running the ethtool offline loopback test on interfaces using the ice driver until the kernel is updated.
- Update the Linux kernel to a version that includes the fix for this vulnerability (post 6.19.0-0.rc7 or later where the fix is applied).
- Monitor kernel logs for crashes related to the ice driver and avoid triggering the loopback test in automated scripts or monitoring tools.