CVE-2025-40083
Description
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix null-deref in agg_dequeue
To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c) when cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the return value before using it, similar to the existing approach in sch_hfsc.c.
To avoid code duplication, the following changes are made:
1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static inline function.
2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to include/net/pkt_sched.h so that sch_qfq can reuse it.
- Applied qdisc_peek_len in agg_dequeue to avoid crashing.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-pointer dereference in the Linux kernel's QFQ packet scheduler (Quick Fair Queueing) packet scheduler could cause a crash; patched by adding a NULL check in agg_dequeue.
Vulnerability
CVE-2025-40083 is a null-pointer dereference vulnerability in the Linux kernel's Quick Fair Queueing (QFQ) packet scheduler, specifically in the agg_dequeue function within net/sched/sch_qfq.c. The root cause is that cl->qdisc->ops->peek(cl->qdisc) can return NULL, and the return value was used without a check, potentially leading to a kernel crash. The fix adds a NULL check before dereferencing the pointer, mirroring the approach already used in the HFSC scheduler (sch_hfsc.c).
Exploitation
To trigger this vulnerability, an attacker would need to be able to influence the QFQ scheduler's state, likely by sending crafted network traffic or manipulating queuing disciplines via netlink (requiring CAP_NET_ADMIN). The bug manifests when the peek operation on a child qdisc returns NULL, which can occur under specific conditions such as an empty queue or when the child qdisc is empty or in an error state. No authentication is required beyond the ability to interact with the scheduler.
Impact
A successful exploit causes a denial of service (kernel panic) on the affected system. The vulnerability does not appear to allow privilege escalation or arbitrary code execution, as it is a straightforward NULL pointer dereference that leads to a crash.
Mitigation
The fix has been applied to the Linux kernel stable branches via commits [1], [2], [3], and [4]. Users should update their kernel to a version containing these commits. No workaround is available other than applying the patch or avoiding use of the QFQ scheduler.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
76ffa9d6618716ff8e74c8f8add831ac8221e71d84658a61399fc137f17871bed56f089f03c2a89948076Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/1bed56f089f09b465420bf23bb32985c305cfc28nvd
- git.kernel.org/stable/c/3c2a8994807623c7655ece205667ae2cf74940aanvd
- git.kernel.org/stable/c/6ff8e74c8f8a68ec07ef837b95425dfe900d060fnvd
- git.kernel.org/stable/c/6ffa9d66187188e3068b5a3895e6ae1ee34f9199nvd
- git.kernel.org/stable/c/71d84658a61322e5630c85c5388fc25e4a2d08b2nvd
- git.kernel.org/stable/c/99fc137f178797204d36ac860dd8b31e35baa2dfnvd
- git.kernel.org/stable/c/dd831ac8221e691e9e918585b1003c7071df0379nvd
News mentions
0No linked articles in our index yet.