Impact
The vulnerability is a NULL pointer dereference in the ice driver’s ice_vsi_set_napi_queues function, which occurs during system resume when a ring’s q_vector pointer is unset. This bug causes the kernel to Oops and crash, resulting in a denial‑of‑service condition. The weakness is identified as CWE‑476, a classic null‑pointer dereference, and does not provide direct code execution or privilege escalation. The crash is triggered by a suspend/resume cycle, which an attacker can initiate locally on the machine. The impact is confined to the kernel and results in an immediate system reboot, but does not expose user data or remote control.
Affected Systems
The affected component is the Linux kernel’s ice driver for Intel Ethernet controllers, particularly the Intel E810 series. Versions of the kernel that include the robustness change to ice_vsi_set_napi_queues are required; the bug is known to exist in kernel releases 6.11, 6.19 releases candidates through rc7, and has been reproduced on a 6.18 kernel. Addressing the issue requires the patched kernel from the official upstream code base.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity. The EPSS score is below 1 %, implying a very low likelihood of exploitation in the wild. The bug is not listed in the CISA KEV catalog. Exploitation requires the ability to trigger a suspend or rtcwake command, meaning a local privileged user can simply reboot the system. The attack vector is local and results solely in a denial of service; no data leakage or persistent compromise is enabled.
OpenCVE Enrichment