VYPR
Unrated severityNVD Advisory· Published Oct 29, 2025· Updated Apr 15, 2026

CVE-2025-40083

CVE-2025-40083

Description

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix null-deref in agg_dequeue

To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c) when cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the return value before using it, similar to the existing approach in sch_hfsc.c.

To avoid code duplication, the following changes are made:

1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static inline function.

2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to include/net/pkt_sched.h so that sch_qfq can reuse it.

  1. Applied qdisc_peek_len in agg_dequeue to avoid crashing.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null-pointer dereference in the Linux kernel's QFQ packet scheduler (Quick Fair Queueing) packet scheduler could cause a crash; patched by adding a NULL check in agg_dequeue.

Vulnerability

CVE-2025-40083 is a null-pointer dereference vulnerability in the Linux kernel's Quick Fair Queueing (QFQ) packet scheduler, specifically in the agg_dequeue function within net/sched/sch_qfq.c. The root cause is that cl->qdisc->ops->peek(cl->qdisc) can return NULL, and the return value was used without a check, potentially leading to a kernel crash. The fix adds a NULL check before dereferencing the pointer, mirroring the approach already used in the HFSC scheduler (sch_hfsc.c).

Exploitation

To trigger this vulnerability, an attacker would need to be able to influence the QFQ scheduler's state, likely by sending crafted network traffic or manipulating queuing disciplines via netlink (requiring CAP_NET_ADMIN). The bug manifests when the peek operation on a child qdisc returns NULL, which can occur under specific conditions such as an empty queue or when the child qdisc is empty or in an error state. No authentication is required beyond the ability to interact with the scheduler.

Impact

A successful exploit causes a denial of service (kernel panic) on the affected system. The vulnerability does not appear to allow privilege escalation or arbitrary code execution, as it is a straightforward NULL pointer dereference that leads to a crash.

Mitigation

The fix has been applied to the Linux kernel stable branches via commits [1], [2], [3], and [4]. Users should update their kernel to a version containing these commits. No workaround is available other than applying the patch or avoiding use of the QFQ scheduler.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.