
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been discovered in the Linux kernel's network scheduler flow classifier (clsflow) component, identified as CVE-2025-21653. The issue was discovered by syzbot and reported on January 19, 2025. The vulnerability stems from an unvalidated TCAFLOW_RSHIFT attribute, which allows right-shifting a 32-bit integer with undefined behavior for large shift values (NVD).
The vulnerability occurs in net/sched/cls_flow.c at line 329:23, where a shift-out-of-bounds condition can be triggered. The issue manifests when the shift exponent exceeds the size limit for a 32-bit type (u32). In the reported case, a shift exponent of 9445 was used, which is significantly larger than the maximum allowed value of 31 bits for a 32-bit integer (Kernel Commit).
When exploited, this vulnerability can lead to undefined behavior in the Linux kernel's network traffic classification system. The issue affects the kernel's ability to properly handle network packet classification, potentially impacting network traffic management and quality of service features (NVD).
The vulnerability has been fixed by implementing proper validation of the TCAFLOWRSHIFT attribute. The fix involves adding a maximum value constraint of 31 (BITSPERU32 - 1) to the attribute using NLAPOLICYMAX. This patch has been merged into the mainline kernel and is being backported to stable kernel versions (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."