Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-68795

CVE-2025-68795: Linux Kernel Buffer Overflow Vulnerability

CVE-2025-68795 is a buffer overflow vulnerability in the Linux kernel's ethtool stats query mechanism that can overflow userspace buffers. This article covers the technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-68795 Overview

A buffer overflow vulnerability has been identified in the Linux kernel's ethtool subsystem, specifically in the handling of network statistics queries. The vulnerability exists in the ethtool -S command implementation, which operates across three separate ioctl calls: ETHTOOL_GSSET_INFO for size information, ETHTOOL_GSTRINGS for stat names, and ETHTOOL_GSTATS for the actual values.

The core issue arises when the number of statistics changes between these ioctl calls, such as during device reconfiguration. This race condition can cause userspace buffer allocations to become incorrectly sized, potentially leading to a buffer overflow condition when writing statistics data.

Critical Impact

Race condition in Linux kernel ethtool stats query can lead to userspace buffer overflow when device statistics count changes between ioctl calls, potentially causing memory corruption or system instability.

Affected Products

  • Linux kernel (versions using affected ethtool implementation)
  • Systems using network drivers with dynamic counters (mlx5, bnx2x, bna, ksz884x)
  • Linux-based network appliances and servers

Discovery Timeline

  • 2026-01-13 - CVE-2025-68795 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2025-68795

Vulnerability Analysis

The vulnerability stems from a fundamental race condition in the ethtool statistics query mechanism. The ethtool -S command requires three separate ioctl calls to retrieve network statistics. First, ETHTOOL_GSSET_INFO is called to determine the size of the statistics buffer. Next, ETHTOOL_GSTRINGS retrieves the names of each statistic. Finally, ETHTOOL_GSTATS fetches the actual values.

Between these calls, the RTNL lock is released, creating a window where the device configuration can change. If a device reconfiguration occurs during this window and the number of available statistics changes, the buffer allocated by userspace based on the initial size query will be incorrectly sized.

Several network drivers use dynamic stat counters, including mlx5, bnx2x, bna, and ksz884x. While some drivers like bnad_get_ethtool_stats() and the micrel/ksz884x driver attempt to handle this internally by checking stats.n_stats, these implementations still use the value returned from get_sset_count(), which doesn't prevent the overflow scenario.

Root Cause

The root cause is a Time-of-Check Time-of-Use (TOCTOU) race condition in the ethtool statistics query implementation. The buffer size is determined at one point in time, but the actual data is written at a later point when the underlying data structure may have changed. The RTNL lock protects individual ioctl calls but is released between them, allowing device reconfiguration to occur.

Attack Vector

The attack vector for this vulnerability involves exploiting the timing window between ethtool ioctl calls. An attacker with the ability to trigger device reconfiguration (either through legitimate administrative access or another vulnerability) could potentially cause a buffer overflow by:

  1. Initiating an ethtool statistics query from userspace
  2. Triggering a device reconfiguration that increases the number of statistics during the race window
  3. The kernel then writes more data than the userspace buffer can accommodate

The patch addresses this by modifying ethtool_get_strings(), ethtool_get_stats(), and ethtool_get_phy_stats() to detect mismatches between userspace's expected size and the current get_sset_size() value. When a mismatch is detected, the functions return without writing any data and set n_stats to zero, preventing the buffer overflow.

Detection Methods for CVE-2025-68795

Indicators of Compromise

  • Unexpected kernel crashes or panics related to network driver operations
  • Memory corruption errors in kernel logs following ethtool statistics queries
  • System instability during network interface reconfiguration
  • Unusual behavior from ethtool commands returning empty or zeroed statistics

Detection Strategies

  • Monitor kernel logs for buffer overflow warnings or memory corruption indicators in network subsystems
  • Implement system call auditing to track ethtool ioctl patterns that may indicate exploitation attempts
  • Deploy kernel runtime protection mechanisms that detect out-of-bounds memory access
  • Use SentinelOne's Singularity platform for real-time kernel-level threat detection

Monitoring Recommendations

  • Enable kernel audit logging for network-related system calls
  • Monitor for unusual patterns of ethtool usage, especially rapid successive calls
  • Track device reconfiguration events that coincide with ethtool statistics queries
  • Implement alerting on kernel oops or panic events related to network drivers

How to Mitigate CVE-2025-68795

Immediate Actions Required

  • Apply the latest Linux kernel patches that include the ethtool overflow fix
  • Review and update systems running affected network drivers (mlx5, bnx2x, bna, ksz884x)
  • Limit administrative access to network interface configuration
  • Monitor systems for signs of exploitation while patches are being deployed

Patch Information

The Linux kernel maintainers have released patches to address this vulnerability. The fix modifies ethtool_get_strings(), ethtool_get_stats(), and ethtool_get_phy_stats() to detect and handle size mismatches safely. When a mismatch between userspace's expected size and the current get_sset_size() value is detected, the functions return with n_stats set to zero rather than potentially overflowing the buffer.

The patches are available through the following commits:

  • Linux Kernel Commit 4066b5b
  • Linux Kernel Commit 4afcb98
  • Linux Kernel Commit 7b07be1
  • Linux Kernel Commit 7bea09f
  • Linux Kernel Commit ca9983b

Workarounds

  • Avoid running ethtool -S during periods of active network interface reconfiguration
  • Implement rate limiting on network device reconfiguration operations
  • Use dedicated monitoring systems that aggregate statistics through alternative kernel interfaces
  • Consider temporary restriction of ethtool access to essential administrative tasks only
bash
# Verify kernel version includes the fix
uname -r

# Check for available kernel updates
apt list --upgradable 2>/dev/null | grep linux-image
# or for RHEL/CentOS:
yum check-update kernel

# Apply kernel updates
apt update && apt upgrade linux-image-*
# or for RHEL/CentOS:
yum update kernel

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Linux Kernel Commit 4066b5b

  • Linux Kernel Commit 4afcb98

  • Linux Kernel Commit 7b07be1

  • Linux Kernel Commit 7bea09f

  • Linux Kernel Commit ca9983b
  • Related CVEs
  • CVE-2026-31449: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31512: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31438: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31450: Linux Kernel Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English