{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-40083","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:20:57.161Z","datePublished":"2025-10-29T13:37:01.868Z","dateUpdated":"2026-05-11T21:42:10.831Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:42:10.831Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/net/pkt_sched.h","net/sched/sch_api.c","net/sched/sch_hfsc.c","net/sched/sch_qfq.c"],"versions":[{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"71d84658a61322e5630c85c5388fc25e4a2d08b2","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"99fc137f178797204d36ac860dd8b31e35baa2df","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"1bed56f089f09b465420bf23bb32985c305cfc28","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"3c2a8994807623c7655ece205667ae2cf74940aa","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"6ffa9d66187188e3068b5a3895e6ae1ee34f9199","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"6ff8e74c8f8a68ec07ef837b95425dfe900d060f","status":"affected","versionType":"git"},{"version":"462dbc9101acd38e92eda93c0726857517a24bbd","lessThan":"dd831ac8221e691e9e918585b1003c7071df0379","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/net/pkt_sched.h","net/sched/sch_api.c","net/sched/sch_hfsc.c","net/sched/sch_qfq.c"],"versions":[{"version":"3.8","status":"affected"},{"version":"0","lessThan":"3.8","status":"unaffected","versionType":"semver"},{"version":"5.4.302","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.247","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.197","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.159","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.116","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.57","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.4.302"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.10.247"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.15.197"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.1.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.6.116"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.12.57"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/71d84658a61322e5630c85c5388fc25e4a2d08b2"},{"url":"https://git.kernel.org/stable/c/99fc137f178797204d36ac860dd8b31e35baa2df"},{"url":"https://git.kernel.org/stable/c/1bed56f089f09b465420bf23bb32985c305cfc28"},{"url":"https://git.kernel.org/stable/c/3c2a8994807623c7655ece205667ae2cf74940aa"},{"url":"https://git.kernel.org/stable/c/6ffa9d66187188e3068b5a3895e6ae1ee34f9199"},{"url":"https://git.kernel.org/stable/c/6ff8e74c8f8a68ec07ef837b95425dfe900d060f"},{"url":"https://git.kernel.org/stable/c/dd831ac8221e691e9e918585b1003c7071df0379"}],"title":"net/sched: sch_qfq: Fix null-deref in agg_dequeue","x_generator":{"engine":"bippy-1.2.0"}}}}