MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$65,779.00-2.35%
  • ethereumEthereum(ETH)$1,923.50-5.22%
  • tetherTether(USDT)$1.000.00%
  • binancecoinBNB(BNB)$613.98-2.25%
  • rippleXRP(XRP)$1.36-3.34%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$81.63-6.25%
  • tronTRON(TRX)$0.282643-0.69%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.052.66%
  • dogecoinDogecoin(DOGE)$0.093237-3.89%
Blockchain Security

PoC Exploit Released for Android/Linux Kernel Vulnerability CVE-2025-38352

Last updated: January 7, 2026 11:45 pm
Published: 2 months ago
Share

A proof-of-concept (PoC) exploit for CVE-2025-38352, a critical race condition vulnerability in the Linux kernel, has been publicly released on GitHub.

The vulnerability, discovered earlier this year, targets the POSIX CPU timers implementation and was previously exploited in limited, targeted attacks against 32-bit Android devices.

CVE-2025-38352 is a use-after-free (UAF) vulnerability in the Linux kernel’s handle_posix_cpu_timers() function.

The flaw occurs when the CONFIG_POSIX_CPU_TIMERS_TASK_WORK configuration flag is disabled, a setting found on most 32-bit Android kernels but not on 64-bit systems.

The vulnerability arises from a race condition that occurs when POSIX CPU timers fire on zombie tasks.

By carefully timing the creation of a zombie process, reaping it through a parent process, and triggering timer deletion, attackers can cause the kernel to access freed memory, leading to privilege escalation or kernel code execution.

Chronomaly Exploit

Security researcher Faith (working at blockchain security firm Zellic) has released “Chronomaly,” a fully functional exploit targeting Linux kernel versions v5.10.x.

The exploit was introduced through a comprehensive three-part technical blog series covering the vulnerability’s discovery, analysis, and exploitation techniques.

The exploit is notable for not requiring kernel symbol offsets or specific memory addresses, making it portable across different kernel configurations.

It implements sophisticated race-window extension techniques via CPU timer manipulation and a cross-cache allocation strategy for sigqueue structures.

The exploit requires a multi-core system with at least two CPUs to reliably trigger the race condition.

Testing confirms successful exploitation on QEMU-virtualized Linux kernels running v5.10.157, with parameters adjustable for different environments.

The vulnerability has been added to CISA’s Known Exploited Vulnerabilities Catalog, indicating active exploitation.

While the threat primarily affects 32-bit Android devices, the kernel components involved are also present in 32-bit variants of other Linux-based systems.

According to the GitHub advisory, users should update to a patched kernel or enable the CONFIG_POSIX_CPU_TIMERS_TASK_WORK option.

The upstream Linux kernel patch (commit f90fff1e152dedf52b932240ebbd670d83330eca) addresses the vulnerability by preventing timer processing on zombie tasks.

Device manufacturers and system administrators should prioritize kernel updates to mitigate this critical vulnerability.

Read more on Cyber Security News

This news is powered by Cyber Security News Cyber Security News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Venus Protocol Paused After User Loses Over $13M in Phishing Scam, Crypto Scams Continue Surge
DeepSnitch AI Bonus: Can 100% Bonus Codes Help You Outpace XRP And BNB In December 2025?
Rosen Law Firm Encourages Balancer Investors to Inquire About Securities Class Action Investigation – BAL
Solana Price Outlook: Will SOL Recover With Strong Institutional Buying? – Cryptopolitan
Mutuum Finance (MUTM) Reports Security Progress With Halborn Ahead of Q4 2025 V1 Testnet

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article $3 Billion Vanished: The ‘Perfect Heist’ That Defined Crypto Crime In 2025
Next Article TechCentral’s Top 10 Technologies to Watch in 2026
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d