CVE-2025-21647

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21647
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21647.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21647
Downstream
Related
Published
2025-01-19T10:18:04.415Z
Modified
2025-11-28T02:34:49.217378Z
Summary
sched: sch_cake: add bounds checks to host bulk flow fairness counts
Details

In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: add bounds checks to host bulk flow fairness counts

Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the per-host bulk flow counters, leading to an out of bounds memory access.

To avoid any such logic errors causing out of bounds memory accesses, this commit factors out all accesses to the per-host bulk flow counters to a series of helpers that perform bounds-checking before any increments and decrements. This also has the benefit of improving readability by moving the conditional checks for the flow mode into these helpers, instead of having them spread out throughout the code (which was the cause of the original logic error).

As part of this change, the flow quantum calculation is consolidated into a helper function, which means that the dithering applied to the ost load scaling is now applied both in the DRR rotation and when a sparse flow's quantum is first initiated. The only user-visible effect of this is that the maximum packet size that can be sent while a flow stays sparse will now vary with +/- one byte in some cases. This should not make a noticeable difference in practice, and thus it's not worth complicating the code to preserve the old behaviour.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21647.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4a4eeefa514db570be025ab46d779af180e2c9bb
Fixed
44fe1efb4961c1a5ccab16bb579dfc6b308ad58b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7725152b54d295b7da5e34c2f419539b30d017bd
Fixed
b1a1743aaa4906c41c426eda97e2e2586f79246d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cde71a5677971f4f1b69b25e854891dbe78066a4
Fixed
bb0245fa72b783cb23a9949c5048781341e91423
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
549e407569e08459d16122341d332cb508024094
Fixed
a777e06dfc72bed73c05dcb437d7c27ad5f90f3f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d4a9039a7b3d8005b90c7b1a55a306444f0e5447
Fixed
27202e2e8721c3b23831563c36ed5ac7818641ba
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
546ea84d07e3e324644025e2aae2d12ea4c5896e
Fixed
91bb18950b88f955838ec0c1d97f74d135756dc7
Fixed
737d4d91d35b5f7fa5bb442651472277318b0bfd
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
d7c01c0714c04431b5e18cf17a9ea68a553d1c3c

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.291
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.235
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.125
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.72
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.10