CVE-2025-68795
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | ethtool | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ethtool utility when the number of network statistics changes between multiple ioctl calls used to query stats. Because ethtool uses three separate ioctl calls to get the size, names, and values of stats, if the stats count changes (due to device reconfiguration or dynamic counters in some drivers), the userspace buffer allocated may be incorrect, leading to a potential buffer overflow. The fix prevents this overflow by returning no data if a mismatch in expected sizes is detected, avoiding incorrect or shifted stats and preventing memory corruption.
How can this vulnerability impact me? :
This vulnerability can lead to a buffer overflow in userspace when querying network statistics with ethtool, which may cause memory corruption or crashes in applications using ethtool. Although the patch prevents overflow and results in either no stats or zeroed stats being reported temporarily, the underlying race condition remains. This could affect the reliability and stability of network monitoring tools or other software relying on ethtool statistics.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing the behavior of the ethtool -S command on network interfaces. Specifically, if you run `ethtool -S <interface>` (e.g., `ethtool -S eth2`) and see either "no stats available" or all stats reported as zero, this may indicate the transient condition caused by the vulnerability. These cases occur when the number of stats changes between ioctl calls, leading to either no output or cleared stats.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating to a Linux kernel version that includes the patch which prevents userspace buffer overflow by handling mismatches in stats size gracefully. Until then, monitoring for the described ethtool -S anomalies can help identify affected devices. There is no direct workaround mentioned; the patch ensures no buffer overflow occurs but does not fix the underlying race condition.