Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What this repo is (and what it provides)
Chronomaly is a Linux/Android kernel exploit for CVE-2025-38352 (noted as previously exploited in-the-wild). It targets vulnerable Linux kernels v5.10.x and was written/tested specifically on Linux kernel v5.10.157 (x86_64) running in QEMU. A key design goal stated in the README is that it does not require fixed kernel text offsets, so it is intended to work across vulnerable 5.10.x builds...
🔧 Technical Details
CPU-timer-assisted race exploitation (probabilistic windowing): When an exploit depends on a very small race window, use CPU timers to generate signal events at controllable times while a racing thread burns CPU (e.g., in
race_func()). Expose whether timers fired by instrumenting the signal polling path (e.g., addprintf()in theSIGUSR1polling loop infree_func()). Tune a threshold parameter (hereCPU_USAGE_THRESHOLD) so timers fire intermittently (not always), indicating the timer sometimes fires before thread exit and sometimes during exit—improving the chance of landing in the intended critical section.Multi-process delay calibration into a specific kernel function’s race window: Coordinate a child and parent process such that the parent introduces a microsecond delay (here
PARENT_SETTIME_DELAY_US) to collide with a second race window in a targeted kernel path (heres...🤖 Agent ActionsUpdated
src/binary-exploitation/linux-kernel-exploitation/posix-cpu-timers-toctou-cve-2025-38352.mdwith Chronomaly exploitation guidance: added environment/config prerequisites, CPU-timer race tuning heuristics, parent/child alignment intosend_sigqueue(), and cross-cachesigqueue→pipe buffer replacement caveats. Expanded references to include the Chronomaly PoC repo and the three-part analysis series.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.