In the Linux kernel, the following vulnerability has been resolved:
netsched: prio: fix a race in priotune()
Gerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer fires at the wrong time.
The race is as follows:
CPU 0 CPU 1 | | [5]: lock root | [6]: rehash | [7]: qdisctreereduce_backlog() | This can be abused to underflow a parent's qlen.
Calling qdiscpurgequeue() instead of qdisctreeflush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.
[
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-068ad60e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53d11560e957d53ee87a0653d258038ce12361b7"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-0bb62136",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@46c15c9d0f65c9ba857d63f53264f4b17e8a715f"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-1ebb11a5",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@93f9eeb678d4c9c1abf720b3615fa8299a490845"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-8249f88e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e3f6745006dc9423d2b065b90f191cfa11b1b584"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-bbef8615",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d35acc1be3480505b5931f17e4ea9b7617fea4d3"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-d03a3c06",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3aaa7c01cf19d9b9bb64b88b65c3a6fd05da2eb4"
},
{
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "net/sched/sch_prio.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"61933998598420471594689949432959531361",
"25196573829403813580139109200312666258",
"190388038944360222812270987064504484411",
"135128721371664461522899876693853744910"
]
},
"deprecated": false,
"id": "CVE-2025-38083-d1127874",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4483d8b9127591c60c4eb789d6cab953bc4522a9"
}
]