๐Ÿ” CVE Alert

CVE-2025-21980

MEDIUM 5.5

sched: address a potential NULL pointer dereference in the GRED scheduler.

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sched: address a potential NULL pointer dereference in the GRED scheduler. If kzalloc in gred_init returns a NULL pointer, the code follows the error handling path, invoking gred_destroy. This, in turn, calls gred_offload, where memset could receive a NULL pointer as input, potentially leading to a kernel crash. When table->opt is NULL in gred_init(), gred_change_table_def() is not called yet, so it is not necessary to call ->ndo_setup_tc() in gred_offload().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f25c0515c521375154c62c72447869f40218c861 < d02c9acd68950a444acda18d514e2b41f846cb7f f25c0515c521375154c62c72447869f40218c861 < 0f0a152957d64ce45b4c27c687e7d087e8f45079 f25c0515c521375154c62c72447869f40218c861 < 68896dd50180b38ea552e49a6a00b685321e5769 f25c0515c521375154c62c72447869f40218c861 < 5f996b4f80c2cef1f9c77275055e7fcba44c9199 f25c0515c521375154c62c72447869f40218c861 < 115ef44a98220fddfab37a39a19370497cd718b9
Linux / Linux
5.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d02c9acd68950a444acda18d514e2b41f846cb7f git.kernel.org: https://git.kernel.org/stable/c/0f0a152957d64ce45b4c27c687e7d087e8f45079 git.kernel.org: https://git.kernel.org/stable/c/68896dd50180b38ea552e49a6a00b685321e5769 git.kernel.org: https://git.kernel.org/stable/c/5f996b4f80c2cef1f9c77275055e7fcba44c9199 git.kernel.org: https://git.kernel.org/stable/c/115ef44a98220fddfab37a39a19370497cd718b9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html