Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-21647

Description

In the Linux kernel, the following vulnerability has been resolved:sched: sch_cake: add bounds checks to host bulk flow fairness countsEven though we fixed a logic error in the commit cited below, syzbotstill managed to trigger an underflow of the per-host bulk flowcounters, leading to an out of bounds memory access.To avoid any such logic errors causing out of bounds memory accesses,this commit factors out all accesses to the per-host bulk flow countersto a series of helpers that perform bounds-checking before anyincrements and decrements. This also has the benefit of improvingreadability by moving the conditional checks for the flow mode intothese helpers, instead of having them spread out throughout thecode (which was the cause of the original logic error).As part of this change, the flow quantum calculation is consolidatedinto a helper function, which means that the dithering applied to theost load scaling is now applied both in the DRR rotation and when asparse flow's quantum is first initiated. The only user-visible effectof this is that the maximum packet size that can be sent while a flowstays sparse will now vary with +/- one byte in some cases. This shouldnot make a noticeable difference in practice, and thus it's not worthcomplicating the code to preserve the old behaviour.

POC

Reference

No PoCs from references.

Github

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/oogasawa/Utility-security

- https://github.com/w4zu/Debian_security