In the Linux kernel, the following vulnerability has been resolved:
sched: address a potential NULL pointer dereference in the GRED scheduler.
If kzalloc in gred_init returns a NULL pointer, the code follows the
error handling path, invoking gred_destroy. This, in turn, calls
gred_offload, where memset could receive a NULL pointer as input,
potentially leading to a kernel crash.
When table->opt is NULL in gred_init(), gred_change_table_def()
is not called yet, so it is not necessary to call ->ndo_setup_tc()
in gred_offload().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-01 16:15
Updated : 2025-11-03 20:17
NVD link : CVE-2025-21980
Mitre link : CVE-2025-21980
CVE.ORG link : CVE-2025-21980
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
