CVE-2025-21692Improper Validation of Array Index in Linux

Severity
7.8HIGHNVD
OSV5.9OSV5.5
EPSS
0.0%
top 94.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 10
Latest updateJan 29

Description

In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ets qdisc OOB Indexing Haowei Yan found that ets_class_from_arg() can index an Out-Of-Bound class in ets_class_from_arg() when passed clid of 0. The overflow may cause local privilege escalation. [ 18.852298] ------------[ cut here ]------------ [ 18.853271] UBSAN: array-index-out-of-bounds in net/sched/sch_ets.c:93:20 [ 18.853743] index 18446744073709551615 is out of range for type 'ets_class [16]' [ 18.85425

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

23
OSV
linux-hwe-6.8 vulnerabilities2025-07-17
OSV
linux-gcp, linux-gcp-6.8 vulnerabilities2025-06-30
OSV
linux-oracle, linux-oracle-6.8, linux-raspi vulnerabilities2025-06-26
OSV
linux-raspi-realtime vulnerabilities2025-06-25
OSV
linux-azure-nvidia vulnerabilities2025-06-25

📋Vendor Advisories

24
Ubuntu
Kernel Live Patch Security Notice2026-01-29
Ubuntu
Linux kernel (HWE) vulnerabilities2025-07-17
Ubuntu
Linux kernel vulnerabilities2025-06-30
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-06-25
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-06-25
CVE-2025-21692 — Improper Validation of Array Index | cvebase