CVE-2026-23166

N/A Unknown

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's ice driver for Intel E810 Ethernet controllers causes kernel crashes when resuming from suspend. This affects systems using Intel E810-XXV network adapters with kernel version 6.18. The crash occurs when the driver attempts to access uninitialized queue vector pointers during resume operations.

💻 Affected Systems

Products:
  • Intel Ethernet Controller E810-XXV for SFP
  • Intel Ethernet Network Adapter E810-XXV-2
Versions: Linux kernel v6.18
Operating Systems: Linux distributions using kernel v6.18
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Intel E810 Ethernet hardware and kernel's ice driver. SR-IOV state (enabled or disabled) does not affect vulnerability. Only triggers during resume from suspend/hibernate.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot the system.

🟠

Likely Case

System fails to resume from suspend/hibernate, requiring hard reboot and potential data loss from unsaved work.

🟢

If Mitigated

With proper patching, resume operations complete successfully without crashes.

🌐 Internet-Facing: LOW - This vulnerability requires local system access and specific hardware configuration to trigger.
🏢 Internal Only: MEDIUM - Affects systems with Intel E810 adapters that use suspend/resume functionality, potentially disrupting operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical or privileged access to trigger suspend/resume cycle. Not remotely exploitable. Complexity is medium due to specific hardware and kernel version requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits 36126ddbe924727add05a594dedf230d3b575e4d, 9bb30be4d89ff9a8d7ab1aa0eb2edaca83431f85, d75c7b7c3c2b8e3569043099e6bdcefc983856c5

Vendor Advisory: https://git.kernel.org/stable/c/36126ddbe924727add05a594dedf230d3b575e4d

Restart Required: No

Instructions:

1. Update to a kernel version containing the fix commits. 2. For custom kernels, apply patches from kernel.org. 3. No kernel restart required - fix applies on next resume operation.

🔧 Temporary Workarounds

Disable suspend functionality

all

Prevent system from entering suspend/hibernate states to avoid triggering the vulnerability

systemctl mask suspend.target
systemctl mask hibernate.target
systemctl mask hybrid-sleep.target

Blacklist ice module

all

Prevent loading of vulnerable ice driver (will disable E810 network functionality)

echo 'blacklist ice' >> /etc/modprobe.d/blacklist-ice.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Avoid using suspend/hibernate functionality on affected systems
  • Consider using alternative network adapters if E810 functionality is not critical

🔍 How to Verify

Check if Vulnerable:

Check if system has Intel E810 adapter: 'lspci | grep 159b' and kernel version: 'uname -r' should show v6.18

Check Version:

uname -r

Verify Fix Applied:

After patching, test suspend/resume: 'systemctl suspend' then wake system. Check dmesg for NULL pointer errors.

📡 Detection & Monitoring

Log Indicators:

  • Kernel NULL pointer dereference in ice_vsi_set_napi_queues
  • BUG: kernel NULL pointer dereference, address: 0000000000000040
  • Oops: Oops: 0000 [#1] SMP NOPTI during resume

Network Indicators:

  • Network connectivity loss after resume from suspend

SIEM Query:

event_source="kernel" AND (message:"NULL pointer dereference" AND message:"ice_vsi_set_napi_queues") OR (message:"0000000000000040" AND process:"kernel")

🔗 References

📤 Share & Export