Impact
A Linux kernel change reduces the TSN transmit packet buffer from 7 KB to 5 KB per queue to prevent frequent TX unit hangs under heavy timestamping load. The previous buffer size caused the hardware to lock up when large volumes of timestamped packets were processed, resulting in a denial‑of‑service condition for both the affected network device and the host kernel. The fix is purely a stability improvement that does not directly expose the system to arbitrary code execution or data exfiltration but can be exploited by generating excessive TSN traffic to trigger the hang.
Affected Systems
The vulnerability exists in the upstream Linux kernel, particularly in the 6.19 release candidates (rc1 through rc6). Any system running a kernel that includes the older 7 KB TSN transmit buffer implementation—before the patch that reduces it to 5 KB—was affected.
Risk and Exploitability
With a CVSS score of 5.5 the severity is moderate. The EPSS indicates exploitation probability is below 1 % and the flaw is not listed in CISA’s KEV catalog, suggesting it is not actively exploited. The likely attack vector involves an attacker (remote or local with network access) who can send or generate large amounts of TSN‑timestamped traffic to force the TX unit into a hung state. The impact would be a slowdown or pause of network traffic for the affected device and a possible kernel lockup if the hang propagates. No additional privileges or access are required beyond the ability to generate TSN traffic on the device’s link.
OpenCVE Enrichment