Impact
A race condition in the Linux ice driver allows the PTP periodic work to access a null vsi->rx_rings pointer after a VSI rebuild, causing a null pointer dereference and kernel panic. The kernel crash results in a loss of system availability and can affect all processes running on the host. The vulnerability is limited to the ice driver but can be triggered when the PTP feature is enabled and a reset occurs during a rebuild sequence.
Affected Systems
The flaw is present in Linux kernel builds that include the ice driver before version 6.19 rc9. CPE data shows that all 6.19 release candidates up through rc8 are affected, as well as other kernel releases containing the same code path. Any system running a kernel with this driver and enabled PTP support is vulnerable until the patch is applied.
Risk and Exploitability
The CVSS score of 4.7 indicates low severity, and the EPSS score of <1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further reducing immediate concern. Based on the description, it is inferred that an attacker would likely need local privileged control to trigger the reset and rebuild sequence, or might be able to provoke the sequence indirectly via PTP commands if exposed. The impact is primarily a denial of service rather than data compromise. Organizations using affected kernel versions should treat the risk as low but mitigate promptly to avoid unexpected system crashes.
OpenCVE Enrichment
Debian DSA