Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-21692

CVE-2025-21692: Linux Kernel Privilege Escalation Flaw

CVE-2025-21692 is a privilege escalation vulnerability in the Linux Kernel's ETS qdisc component that allows local attackers to gain elevated privileges through OOB indexing. This article covers technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-21692 Overview

CVE-2025-21692 is an out-of-bounds indexing vulnerability in the Linux kernel's Enhanced Transmission Selection (ETS) qdisc network scheduler component. The vulnerability exists in the ets_class_from_arg() function within net/sched/sch_ets.c, which fails to properly validate the class ID (clid) parameter. When a clid value of 0 is passed, it results in an array index underflow, causing the function to access memory outside the bounds of the ets_class array.

Critical Impact

Local attackers with limited privileges can exploit this out-of-bounds array access to potentially achieve local privilege escalation on affected Linux systems.

Affected Products

  • Linux Kernel versions 5.10.x through 5.10.233 (prior to fix)
  • Linux Kernel versions 5.15.x through 6.12.x (various branches)
  • Linux Kernel version 6.13 release candidates (rc1 through rc7)

Discovery Timeline

  • 2025-02-10 - CVE CVE-2025-21692 published to NVD
  • 2025-11-03 - Last updated in NVD database

Technical Details for CVE-2025-21692

Vulnerability Analysis

This vulnerability is classified as CWE-129 (Improper Validation of Array Index). The ETS qdisc is a network traffic control mechanism that allows administrators to configure traffic class prioritization. The vulnerability occurs when the ets_class_from_arg() function receives an invalid class identifier of 0, which when processed causes an array index calculation that results in an extremely large negative value (-1, represented as 18446744073709551615 in unsigned 64-bit representation).

The UBSAN (Undefined Behavior Sanitizer) error message captured during exploitation attempts clearly shows the array index overflow: "index 18446744073709551615 is out of range for type 'ets_class [16]'". This indicates the array only has 16 elements, but the calculated index wraps around to an astronomically large value due to integer underflow.

Root Cause

The root cause is insufficient input validation in the ets_class_from_arg() function. When processing traffic control class operations via netlink messages, the function fails to verify that the provided clid parameter is within valid bounds before using it as an array index. Specifically, passing a clid value of 0 causes the function to calculate an invalid array offset, leading to out-of-bounds memory access.

The call chain begins when a user sends a netlink message through sendmsg() syscall, which is processed through rtnetlink_rcv_msg() → tc_ctl_tclass() → ets_class_change(), ultimately reaching the vulnerable ets_class_from_arg() function at line 93 of sch_ets.c.

Attack Vector

The vulnerability requires local access and can be triggered by a low-privileged user with the ability to send netlink messages to configure traffic control settings. The attacker crafts a malicious netlink message with a clid parameter set to 0, which when processed by the kernel's traffic control subsystem causes the out-of-bounds array access.

The attack path involves:

  1. Opening a netlink socket for rtnetlink communication
  2. Constructing a TC_CTL_TCLASS netlink message with clid=0
  3. Sending the message via sendmsg() syscall
  4. The kernel processes the message and triggers the OOB access

Since the vulnerability allows reading or writing to arbitrary kernel memory locations relative to the ets_class array base, successful exploitation could lead to information disclosure, kernel memory corruption, or privilege escalation depending on what memory is accessed.

Detection Methods for CVE-2025-21692

Indicators of Compromise

  • UBSAN kernel log messages indicating "array-index-out-of-bounds in net/sched/sch_ets.c"
  • Unusual netlink traffic control configuration attempts from non-root users
  • Kernel crash dumps or oops messages referencing ets_class_change() or ets_class_from_arg() functions
  • Processes named "poc" or suspicious binaries attempting traffic control operations

Detection Strategies

  • Enable UBSAN (Undefined Behavior Sanitizer) in kernel builds to catch array bounds violations at runtime
  • Monitor audit logs for sendmsg syscalls targeting netlink sockets with traffic control operations
  • Deploy kernel runtime integrity monitoring to detect unauthorized memory access patterns
  • Implement system call filtering using seccomp to restrict netlink traffic control operations for unprivileged processes

Monitoring Recommendations

  • Configure syslog aggregation to alert on UBSAN and kernel warning messages containing "sch_ets" references
  • Use endpoint detection solutions to monitor for unusual traffic control configuration activity
  • Enable kernel tracing on tc_ctl_tclass function to identify exploitation attempts
  • Audit user processes attempting to interact with traffic control subsystems

How to Mitigate CVE-2025-21692

Immediate Actions Required

  • Apply the official kernel patches from the Linux kernel stable branches immediately
  • Restrict netlink socket access to trusted administrators using network namespaces or capability controls
  • Consider disabling the ETS qdisc module (sch_ets) if not actively used in your environment
  • Enable UBSAN in development and testing environments to catch similar issues

Patch Information

Multiple patches have been released across different Linux kernel stable branches to address this vulnerability. The fix adds proper validation of the clid parameter in ets_class_from_arg() to ensure it falls within valid bounds before being used as an array index.

Official patches are available from the following kernel commits:

  • Kernel commit 03c56665dab1
  • Kernel commit 1332c6ed446b
  • Kernel commit 997f6ec4208b
  • Kernel commit bcf0d815e728
  • Kernel commit d62b04fca434
  • Kernel commit f4168299e553
  • Kernel commit f6b0f05fbfa4

Debian users should refer to the Debian LTS security announcements for distribution-specific package updates.

Workarounds

  • Remove or blacklist the sch_ets kernel module if ETS qdisc functionality is not required: echo "blacklist sch_ets" >> /etc/modprobe.d/blacklist-sch_ets.conf
  • Use network namespaces to isolate untrusted processes from traffic control capabilities
  • Implement SELinux or AppArmor policies to restrict netlink socket operations for non-privileged applications
  • Deploy capability-based access controls to limit CAP_NET_ADMIN to trusted processes only
bash
# Blacklist the sch_ets module to prevent loading
echo "blacklist sch_ets" | sudo tee /etc/modprobe.d/blacklist-sch_ets.conf

# Unload the module if currently loaded
sudo modprobe -r sch_ets

# Verify module is not loaded
lsmod | grep sch_ets

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-129
  • Technical References
  • Debian LTS Announcement

  • Debian LTS Announcement
  • Vendor Resources
  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update
  • Related CVEs
  • CVE-2026-31430: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31443: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31463: Linux Kernel Privilege Escalation Flaw

  • CVE-2026-31459: Linux Kernel Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English