
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2025-21647) was discovered in the sch_cake module affecting the host bulk flow fairness counts. The issue was identified when syzbot triggered an underflow of the per-host bulk flow counters, leading to an out-of-bounds memory access. This vulnerability was reported on January 19, 2025, and affects various Linux kernel versions (NVD, Debian Tracker).
The vulnerability stems from a logic error in the host bulk flow counter handling within the sch_cake module. When processing network traffic, the code could trigger an underflow of the per-host bulk flow counters, resulting in out-of-bounds memory access. The issue occurs despite previous fixes, indicating a deeper architectural problem in how the flow counters are managed (Kernel Commit).
The vulnerability could lead to out-of-bounds memory access in the Linux kernel's network scheduling component. This could potentially result in system crashes, memory corruption, or possible privilege escalation, though the exact impact depends on the specific exploitation conditions (NVD).
The issue has been fixed in the Linux kernel through a patch that adds bounds checks to host bulk flow fairness counts. The fix involves factoring out all accesses to the per-host bulk flow counters into a series of helpers that perform bounds-checking before any increments and decrements. The patch is available in various kernel versions, including 6.1.128-1 for Debian bookworm (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."