PT-2025-30384 · Linux +4 · Linux Kernel +4

Published

2025-07-22

·

Updated

2025-09-12

·

CVE-2025-38352

CVSS v3.1
7.4
VectorAV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:**

Linux kernel versions prior to 6.1.147-1

Linux kernel version 6.6.101

**Description:**

A race condition exists in the Linux kernel’s POSIX CPU timer handling, specifically within the `handle posix cpu timers()` and `posix cpu timer del()` functions. This condition can occur when an exiting task is reaped, potentially leading to a use-after-free scenario. An attacker with local user access could exploit this flaw to crash the system or escalate their privileges. The vulnerability is actively exploited. The fix involves adding a check for `tsk->exit state` within the `run posix cpu timers()` function. This fix is not required if `CONFIG POSIX CPU TIMERS TASK WORK=y` is enabled.

**Recommendations:**

Linux kernel versions prior to 6.1.147-1: Upgrade to version 6.1.147-1 or later.

Linux kernel versions prior to 6.6.101: Upgrade to version 6.6.101 or later.

Fix

Time Of Check To Time Of Use

Race Condition

Weakness Enumeration

Related Identifiers

ALSA-2025:15471
ALSA-2025:15472
ASB-A-425282960
BDU:2025-10870
CVE-2025-38352
DSA-5973-1
MGASA-2025-0218
MGASA-2025-0219
OESA-2025-2002
OESA-2025-2003
OESA-2025-2004
OESA-2025-2005
OESA-2025-2006
RHSA-2025_15471
RHSA-2025_15472
RHSA-2025_15661
SUSE-SU-2025:02853-1
SUSE-SU-2025:02923-1
SUSE-SU-2025:02969-1
SUSE-SU-2025:03023-1

Affected Products

Astra Linux
Debian
Linux Kernel
Red Hat
Red Os