CVE-2025-37932

Source
https://cve.org/CVERecord?id=CVE-2025-37932
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37932.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37932
Downstream
Related
Published
2025-05-20T15:21:57.469Z
Modified
2026-03-20T12:42:34.319774Z
Summary
sch_htb: make htb_qlen_notify() idempotent
Details

In the Linux kernel, the following vulnerability has been resolved:

schhtb: make htbqlen_notify() idempotent

htbqlennotify() always deactivates the HTB class and in fact could trigger a warning if it is already deactivated. Therefore, it is not idempotent and not friendly to its callers, like fqcodeldequeue().

Let's make it idempotent to ease qdisctreereduce_backlog() callers' life.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37932.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
959466588aa7f84ccf79ae36a1d89542eaf9aaec
Fixed
e6b45f4de763b00dc1c55e685e2dd1aaf525d3c1
Fixed
32ae12ce6a9f6bace186ca7335220ff59b6cc3cd
Fixed
967955c9e57f8eebfccc298037d4aaf3d42bc1c9
Fixed
73cf6af13153d62f9b76eff422eea79dbc70f15e
Fixed
bbbf5e0f87078b715e7a665d662a2c0e77f044ae
Fixed
0a188c0e197383683fd093ab1ea6ce9a5869a6ea
Fixed
a61f1b5921761fbaf166231418bc1db301e5bf59
Fixed
5ba8b837b522d7051ef81bacf3d95383ff8edce5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37932.json"