CVE-2026-23122

Severity
5.5MEDIUM
EPSS
0.0%
top 96.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per queue caused TX unit hangs under heavy timestamping load. Reducing to 5 KB avoids these hangs and matches the TSN recommendation in I225/I226 SW User Manual Section 7.5.4. The 8 KB "freed" by this change is currently unused. This reduction is not expected to impact throughput, as the i226 is PCIe-limited for small TSN packets rather than TX-buffe

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.166.18.8+1
CVEListV5linux/linux0d58cdc902dace2298406b3972def04f55e3d77588037973c8ef6032bf84e9955595f8b20bc14c21+2
Debianlinux< 6.18.8-1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23122: In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per q2026-02-14
GHSA
GHSA-j2h6-x5fv-586q: In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per2026-02-14
CVEList
igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue2026-02-14
Debian
CVE-2026-23122: linux - In the Linux kernel, the following vulnerability has been resolved: igc: Reduce...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23122 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23122 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io