Race Condition in Linux Kernel Affecting CPU Timer Handling
CVE-2025-38352

7.4HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
22 July 2025

Badges

πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 5,880πŸ’° RansomwareπŸ‘Ύ Exploit Exists🟑 Public PoCπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2025-38352?

CVE-2025-38352 is a vulnerability found in the Linux kernel related to the handling of CPU timers. The issue arises from a race condition occurring in the handle_posix_cpu_timers() function, which is called when a task's CPU timer needs to be processed. If a task that is actively being terminated concurrently invokes this function, it may interfere with the timer's deletion process, creating potential instability. Specifically, if the task has reached the exit notification stage and is reaped by its parent or debugger while the timer deletion function is executing, the necessary checks for the timer’s state may fail, leading to undefined behavior.

This vulnerability poses a significant risk to organizations utilizing Linux systems since the kernel is foundational to the operating system's stability and security. The potential consequences range from system crashes to the possibility of malicious exploitation, where an attacker could leverage this vulnerability to execute arbitrary code or escalate privileges.

Potential impact of CVE-2025-38352

  1. System Instability: The concurrent execution of the timer handling and task termination functions could lead to unpredictable system behavior, including crashes or hangs, disrupting services and critical applications running on Linux.

  2. Privilege Escalation: If exploited, this vulnerability could allow an attacker to execute malicious code within the context of a higher privileged user, increasing their control over the system and enabling further attacks.

  3. Increased Attack Surface: The existence of this vulnerability may provide threat actors a new vector for exploitation, particularly if it can be leveraged in conjunction with other vulnerabilities or misconfigurations, leading to a broader compromise of organizational security.

CISA has reported CVE-2025-38352

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-38352 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux 0bdd2ed4138ec04e09b4f8165981efc99e439f55 < 78a4b8e3795b31dae58762bc091bb0f4f74a2200

Linux 0bdd2ed4138ec04e09b4f8165981efc99e439f55

Linux 0bdd2ed4138ec04e09b4f8165981efc99e439f55 < 2f3daa04a9328220de46f0d5c919a6c0073a9f0b

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352

A PoC exploit for CVE-2025-38352, a Linux kernel race condition, has been released on GitHub after limited attacks on 32-bit Android devices.

3 weeks ago

PoC Exploit Released for Android and Linux Kernel Vulnerability CVE-2025-38352

The exploit, dubbed "Chronomaly," demonstrates complete privilege escalation to root access on vulnerable systems.

3 weeks ago

PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel's POSIX CPU Timers Implementation

A public proof-of-concept exploit released for a Linux kernel flaw that could let attackers gain higher privileges and compromise systems.

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • 🟑

    Public PoC available

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ¦…

    CISA Reported

  • πŸ’°

    Used in Ransomware

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

.