VulnerAlert



LINUX
13-01-2026 23:20

CVE-2025-68795 Vulnerabilidad documentada

Sin puntuación
Tags
#cross
#using
#kernel
#drive
#dict
#config
#change
#add
#linux
#vulnerability
#apps
#application
#patch
#overflow
#issue
#fix
#error
#detected
#configuration
Descripción
In the Linux kernel, following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for size, ETHTOOL_GSTRINGS names, and ETHTOOL_GSTATS values. If number of changes between these calls (e.g., due to device reconfiguration), userspace's allocation will be incorrect, potentially leading overflow. Drivers are generally expected maintain stable stat counts, but some drivers mlx5, bnx2x, bna, ksz884x) use dynamic counters, making this scenario possible. Some drivers try handle this internally: - bnad_get_ethtool_stats() returns early in case stats.n_stats is not equal driver's count. - micrel/ksz884x also makes sure not write anything beyond and overflow buffer. However, both which already assigned with value returned from get_sset_count(), hence won't solve issue described here. Change ethtool_get_strings(), ethtool_get_stats(), ethtool_get_phy_stats() return a mismatch between size get_sset_size(), prevent buffer overflow. The returned n_stats value zero, reflect that nothing returned. This could result one two cases when using upstream ethtool, depending change detected: 1. When detected ethtool_get_strings(): # eth2 no available 2. get stats, all reported as zero. Both presumably transient, subsequent call should succeed. Other than avoidance, very evident (no output/cleared stats), arguably better presenting incorrect/shifted stats. I considered returning an error instead "silent" response, but that seems more destructive towards apps. Notes: - This patch does claim fix inherent race, it only sure that we do buffer, more predictable behavior. - RTNL lock held during each ioctl, race window exists between separate released. - Userspace always fills stats.n_stats, likely that ioctls implemented other applications might fill it. The added code checks it's zero, any regressions.
https://git.kernel.org/stable/c/4066b5b546293f44cd6d0e84ece6e3ee7ff27093
https://git.kernel.org/stable/c/4afcb985355210e1688560dc47e64b94dad35d71
https://git.kernel.org/stable/c/7b07be1ff1cb6c49869910518650e8d0abc7d25f
https://git.kernel.org/stable/c/7bea09f60f2ad5d232e2db8f1c14e850fd3fd416
https://git.kernel.org/stable/c/ca9983bc3a1189bd72f9ae449d925a66b2616326
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-68795
Resultados similares
Coincidentes en almenos en 50% de los tags
13-01-2026 CVE-2025-71085
In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand...
Ver información
13-01-2026
Linux : openSUSE: libpng16 Important Buffer Overflow Sync Summary 2026:20017-1 An update that s...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por