Логотип exploitDog
bind:CVE-2025-38352
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38352

Количество 48

Количество 48

ubuntu логотип

CVE-2025-38352

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2025-38352

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2025-38352

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2025-38352

8 месяцев назад

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2025-38352

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.4
EPSS: Низкий
rocky логотип

RLSA-2025:15662

6 месяцев назад

Important: kernel security update

EPSS: Низкий
github логотип

GHSA-mr4j-mh66-4679

8 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
EPSS: Низкий
oracle-oval логотип

ELSA-2025-15662

7 месяцев назад

ELSA-2025-15662: kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-10870

8 месяцев назад

Уязвимость функции handle_posix_cpu_timers ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.6
EPSS: Низкий
rocky логотип

RLSA-2025:15471

6 месяцев назад

Important: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15648

6 месяцев назад

ELSA-2025-15648: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-15471

7 месяцев назад

ELSA-2025-15471: kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0521-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0518-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0515-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0565-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0556-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0546-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0539-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0535-1

около 1 месяца назад

Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38352

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
0%
Низкий
8 месяцев назад
redhat логотип
CVE-2025-38352

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.8
0%
Низкий
8 месяцев назад
nvd логотип
CVE-2025-38352

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
0%
Низкий
8 месяцев назад
msrc логотип
CVE-2025-38352

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

CVSS3: 7.4
0%
Низкий
8 месяцев назад
debian логотип
CVE-2025-38352

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.4
0%
Низкий
8 месяцев назад
rocky логотип
RLSA-2025:15662

Important: kernel security update

0%
Низкий
6 месяцев назад
github логотип
GHSA-mr4j-mh66-4679

In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.

CVSS3: 7.4
0%
Низкий
8 месяцев назад
oracle-oval логотип
ELSA-2025-15662

ELSA-2025-15662: kernel security update (IMPORTANT)

7 месяцев назад
fstec логотип
BDU:2025-10870

Уязвимость функции handle_posix_cpu_timers ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.6
0%
Низкий
8 месяцев назад
rocky логотип
RLSA-2025:15471

Important: kernel security update

6 месяцев назад
oracle-oval логотип
ELSA-2025-15648

ELSA-2025-15648: kernel security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-15471

ELSA-2025-15471: kernel security update (IMPORTANT)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0521-1

Security update for the Linux Kernel (Live Patch 69 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0518-1

Security update for the Linux Kernel (Live Patch 64 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0515-1

Security update for the Linux Kernel (Live Patch 65 for SUSE Linux Enterprise 12 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0565-1

Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0556-1

Security update for the Linux Kernel (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0546-1

Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0539-1

Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0535-1

Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5)

около 1 месяца назад

Уязвимостей на страницу