Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37953
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-20 May, 2025 | 16:01
Updated At-03 Nov, 2025 | 19:57
Rejected At-
▼CVE Numbering Authority (CNA)
sch_htb: make htb_deactivate() idempotent

In the Linux kernel, the following vulnerability has been resolved: sch_htb: make htb_deactivate() idempotent Alan reported a NULL pointer dereference in htb_next_rb_node() after we made htb_qlen_notify() idempotent. It turns out in the following case it introduced some regression: htb_dequeue_tree(): |-> fq_codel_dequeue() |-> qdisc_tree_reduce_backlog() |-> htb_qlen_notify() |-> htb_deactivate() |-> htb_next_rb_node() |-> htb_deactivate() For htb_next_rb_node(), after calling the 1st htb_deactivate(), the clprio[prio]->ptr could be already set to NULL, which means htb_next_rb_node() is vulnerable here. For htb_deactivate(), although we checked qlen before calling it, in case of qlen==0 after qdisc_tree_reduce_backlog(), we may call it again which triggers the warning inside. To fix the issues here, we need to: 1) Make htb_deactivate() idempotent, that is, simply return if we already call it before. 2) Make htb_next_rb_node() safe against ptr==NULL. Many thanks to Alan for testing and for the reproducer.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/sched/sch_htb.c
Default Status
unaffected
Versions
Affected
  • From e6b45f4de763b00dc1c55e685e2dd1aaf525d3c1 before 99ff8a20fd61315bf9ae627440a5ff07d22ee153 (git)
  • From 32ae12ce6a9f6bace186ca7335220ff59b6cc3cd before a9945f7cf1709adc5d2d31cb6cfc85627ce299a8 (git)
  • From 967955c9e57f8eebfccc298037d4aaf3d42bc1c9 before c2d25fddd867ce20a266806634eeeb5c30cb520c (git)
  • From 73cf6af13153d62f9b76eff422eea79dbc70f15e before c928dd4f6bf0c25c72b11824a1e9ac9bd37296a0 (git)
  • From bbbf5e0f87078b715e7a665d662a2c0e77f044ae before 31ff70ad39485698cf779f2078132d80b57f6c07 (git)
  • From 0a188c0e197383683fd093ab1ea6ce9a5869a6ea before 98cd7ed92753090a714f0802d4434314526fe61d (git)
  • From a61f1b5921761fbaf166231418bc1db301e5bf59 before c4792b9e38d2f61b07eac72f10909fa76130314b (git)
  • From 5ba8b837b522d7051ef81bacf3d95383ff8edce5 before 3769478610135e82b262640252d90f6efb05be71 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/sched/sch_htb.c
Default Status
unaffected
Versions
Affected
  • From 6.1.138 before 6.1.139 (semver)
  • From 6.6.90 before 6.6.91 (semver)
  • From 6.12.28 before 6.12.29 (semver)
  • From 6.14.6 before 6.14.7 (semver)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/99ff8a20fd61315bf9ae627440a5ff07d22ee153
N/A
https://git.kernel.org/stable/c/a9945f7cf1709adc5d2d31cb6cfc85627ce299a8
N/A
https://git.kernel.org/stable/c/c2d25fddd867ce20a266806634eeeb5c30cb520c
N/A
https://git.kernel.org/stable/c/c928dd4f6bf0c25c72b11824a1e9ac9bd37296a0
N/A
https://git.kernel.org/stable/c/31ff70ad39485698cf779f2078132d80b57f6c07
N/A
https://git.kernel.org/stable/c/98cd7ed92753090a714f0802d4434314526fe61d
N/A
https://git.kernel.org/stable/c/c4792b9e38d2f61b07eac72f10909fa76130314b
N/A
https://git.kernel.org/stable/c/3769478610135e82b262640252d90f6efb05be71
N/A
Hyperlink: https://git.kernel.org/stable/c/99ff8a20fd61315bf9ae627440a5ff07d22ee153
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a9945f7cf1709adc5d2d31cb6cfc85627ce299a8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c2d25fddd867ce20a266806634eeeb5c30cb520c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c928dd4f6bf0c25c72b11824a1e9ac9bd37296a0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/31ff70ad39485698cf779f2078132d80b57f6c07
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/98cd7ed92753090a714f0802d4434314526fe61d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c4792b9e38d2f61b07eac72f10909fa76130314b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3769478610135e82b262640252d90f6efb05be71
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
Resource: N/A
Details not found