CVE-2025-38352

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*

History

05 Sep 2025, 14:18

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff - () https://git.kernel.org/stable/c/2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff - Patch
References () https://git.kernel.org/stable/c/2f3daa04a9328220de46f0d5c919a6c0073a9f0b - () https://git.kernel.org/stable/c/2f3daa04a9328220de46f0d5c919a6c0073a9f0b - Patch
References () https://git.kernel.org/stable/c/460188bc042a3f40f72d34b9f7fc6ee66b0b757b - () https://git.kernel.org/stable/c/460188bc042a3f40f72d34b9f7fc6ee66b0b757b - Patch
References () https://git.kernel.org/stable/c/764a7a5dfda23f69919441f2eac2a83e7db6e5bb - () https://git.kernel.org/stable/c/764a7a5dfda23f69919441f2eac2a83e7db6e5bb - Patch
References () https://git.kernel.org/stable/c/78a4b8e3795b31dae58762bc091bb0f4f74a2200 - () https://git.kernel.org/stable/c/78a4b8e3795b31dae58762bc091bb0f4f74a2200 - Patch
References () https://git.kernel.org/stable/c/c076635b3a42771ace7d276de8dc3bc76ee2ba1b - () https://git.kernel.org/stable/c/c076635b3a42771ace7d276de8dc3bc76ee2ba1b - Patch
References () https://git.kernel.org/stable/c/c29d5318708e67ac13c1b6fc1007d179fb65b4d7 - () https://git.kernel.org/stable/c/c29d5318708e67ac13c1b6fc1007d179fb65b4d7 - Patch
References () https://git.kernel.org/stable/c/f90fff1e152dedf52b932240ebbd670d83330eca - () https://git.kernel.org/stable/c/f90fff1e152dedf52b932240ebbd670d83330eca - Patch

02 Sep 2025, 21:15

Type Values Removed Values Added
CWE CWE-362 CWE-367

02 Sep 2025, 20:15

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4

22 Jul 2025, 13:05

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: posix-cpu-timers: corregir la ejecución entre handle_posix_cpu_timers() y posix_cpu_timer_del(). Si una tarea no autorecuperadora que está saliendo ya ha pasado exit_notify() y llama a handle_posix_cpu_timers() desde IRQ, puede ser recuperada por su padre o depurador justo después de unlock_task_sighand(). Si en ese momento se ejecuta un posix_cpu_timer_del() concurrente, no podrá detectar timer->it.cpu.firing != 0: cpu_timer_task_rcu() y/o lock_task_sighand() fallarán. Agregue la verificación tsk->exit_state en run_posix_cpu_timers() para corregir esto. Esta corrección no es necesaria si CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, porque exit_task_work() se llama antes de exit_notify(). Pero la verificación sigue teniendo sentido, task_work_add(&tsk->posix_cputimers_work.work) fallará de todos modos en este caso.

22 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 08:15

Updated : 2025-09-05 14:18


NVD link : CVE-2025-38352

Mitre link : CVE-2025-38352

CVE.ORG link : CVE-2025-38352


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition