Impact
The vulnerability in the Xilinx AXI Ethernet driver prevents accurate accounting of transmitted data when packets span multiple buffer descriptors. The driver sums per‑BD lengths but discards partial sums when a packet completes over multiple NAPI polls, causing the earlier bytes to be lost from the Byte Queue Limits (BQL) tracker. This misreporting makes the kernel believe the interface still has bytes in flight, leading the TX queue to appear permanently full and eventually stall further transmissions.
Affected Systems
Linux kernels that include the Xilinx AXI Ethernet driver before the CVE fix. The bug applies to devices using this driver in any environment where the driver is compiled into the kernel; there are no specific version constraints listed, so it is prudent to consider all kernels up to the commit that implements the fix as potentially affected.
Risk and Exploitability
The flaw results in a denial of service condition: a system or application that generates high rates of outbound traffic over the AXI Ethernet interface can trigger the BQL miscount and cause the TX queue to block, degrading network performance or halting traffic. No remote exploit is required; the effect occurs by sending ordinary network packets. The EPSS score is unavailable, and the vulnerability is not listed in CISA KEV, suggesting limited awareness, but the intrinsic severity of a sustained TX queue stall warrants careful attention. The CVSS score is not provided, but the operational impact and required packet load imply a high likelihood of exploitation in environments where the driver is in use.
OpenCVE Enrichment