In the Linux kernel, the following vulnerability has been resolved:
sched: address a potential NULL pointer dereference in the GRED scheduler.
If kzalloc in gredinit returns a NULL pointer, the code follows the error handling path, invoking greddestroy. This, in turn, calls gred_offload, where memset could receive a NULL pointer as input, potentially leading to a kernel crash.
When table->opt is NULL in gredinit(), gredchangetabledef() is not called yet, so it is not necessary to call ->ndosetuptc() in gred_offload().
[
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f0a152957d64ce45b4c27c687e7d087e8f45079",
"deprecated": false,
"id": "CVE-2025-21980-3170df5f",
"target": {
"file": "net/sched/sch_gred.c",
"function": "gred_destroy"
},
"digest": {
"length": 233.0,
"function_hash": "337669784372811802139832015904155394625"
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d02c9acd68950a444acda18d514e2b41f846cb7f",
"deprecated": false,
"id": "CVE-2025-21980-4128e426",
"target": {
"file": "net/sched/sch_gred.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"151705847151880108674975990767263307195",
"186362533962522367965630424876625871036",
"36151590655854893772452858054431500875",
"153996820696886835615552033211329611983"
]
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f996b4f80c2cef1f9c77275055e7fcba44c9199",
"deprecated": false,
"id": "CVE-2025-21980-5b99033c",
"target": {
"file": "net/sched/sch_gred.c",
"function": "gred_destroy"
},
"digest": {
"length": 233.0,
"function_hash": "337669784372811802139832015904155394625"
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f996b4f80c2cef1f9c77275055e7fcba44c9199",
"deprecated": false,
"id": "CVE-2025-21980-65371ea7",
"target": {
"file": "net/sched/sch_gred.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"151705847151880108674975990767263307195",
"186362533962522367965630424876625871036",
"36151590655854893772452858054431500875",
"153996820696886835615552033211329611983"
]
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68896dd50180b38ea552e49a6a00b685321e5769",
"deprecated": false,
"id": "CVE-2025-21980-709f0023",
"target": {
"file": "net/sched/sch_gred.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"151705847151880108674975990767263307195",
"186362533962522367965630424876625871036",
"36151590655854893772452858054431500875",
"153996820696886835615552033211329611983"
]
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68896dd50180b38ea552e49a6a00b685321e5769",
"deprecated": false,
"id": "CVE-2025-21980-c7120fe1",
"target": {
"file": "net/sched/sch_gred.c",
"function": "gred_destroy"
},
"digest": {
"length": 233.0,
"function_hash": "337669784372811802139832015904155394625"
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f0a152957d64ce45b4c27c687e7d087e8f45079",
"deprecated": false,
"id": "CVE-2025-21980-d036373a",
"target": {
"file": "net/sched/sch_gred.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"151705847151880108674975990767263307195",
"186362533962522367965630424876625871036",
"36151590655854893772452858054431500875",
"153996820696886835615552033211329611983"
]
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@115ef44a98220fddfab37a39a19370497cd718b9",
"deprecated": false,
"id": "CVE-2025-21980-d2df9982",
"target": {
"file": "net/sched/sch_gred.c",
"function": "gred_destroy"
},
"digest": {
"length": 233.0,
"function_hash": "337669784372811802139832015904155394625"
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d02c9acd68950a444acda18d514e2b41f846cb7f",
"deprecated": false,
"id": "CVE-2025-21980-da811fed",
"target": {
"file": "net/sched/sch_gred.c",
"function": "gred_destroy"
},
"digest": {
"length": 233.0,
"function_hash": "337669784372811802139832015904155394625"
}
},
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@115ef44a98220fddfab37a39a19370497cd718b9",
"deprecated": false,
"id": "CVE-2025-21980-db35d0e6",
"target": {
"file": "net/sched/sch_gred.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"151705847151880108674975990767263307195",
"186362533962522367965630424876625871036",
"36151590655854893772452858054431500875",
"153996820696886835615552033211329611983"
]
}
}
]