PT-2025-30384 · Linux +11 · Linux Kernel +11
Published
2025-07-22
·
Updated
2026-02-03
·
CVE-2025-38352
CVSS v3.1
7.4
7.4
High
| Base vector | Vector | AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel versions prior to 6.1.153-1~deb11u1
Linux kernel versions prior to 5.10.244-1
Linux kernel (affected versions not specified)
Description
The Linux kernel contains vulnerabilities that may lead to privilege escalation, denial of service, or information leaks. The vulnerabilities have been addressed in versions 6.1.153-1~deb11u1 and 5.10.244-1 for Debian 11 bullseye. Modules are now signed with an ephemeral key on all architectures, and the broken pktcdvd driver is disabled. The hyperv-daemons package is also provided on arm64.
Recommendations
Upgrade the Linux kernel to version 6.1.153-1~deb11u1 or later.
Upgrade the Linux kernel to version 5.10.244-1 or later.
Reboot the system after installing the update.
Exploit
Fix
LPE
Time Of Check To Time Of Use
Race Condition
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
ALSA-2025:15471
ALSA-2025:15472
ALSA-2025:15661
ALSA-2025:15662
ALT-PU-2025-12647
ASB-A-425282960
BDU:2025-10870
CESA-2025_15471
CESA-2025_15472
CESA-2025_15921
CVE-2025-38352
DLA-4327-1
DLA-4328-1
DSA-5973-1
ECHO-11F2-D185-A1F8
INFSA-2025_15471
INFSA-2025_15472
INFSA-2025_15661
LSN-0116-1
MGASA-2025-0218
MGASA-2025-0219
OESA-2025-2002
OESA-2025-2003
OESA-2025-2004
OESA-2025-2005
OESA-2025-2006
OESA-2025-2553
RHSA-2025:15662
RHSA-2025_15471
RHSA-2025_15472
RHSA-2025_15661
SUSE-SU-2025:02853-1
SUSE-SU-2025:02923-1
SUSE-SU-2025:02969-1
SUSE-SU-2025:03023-1
SUSE-SU-2025:03283-1
SUSE-SU-2025:03314-1
SUSE-SU-2025:4315-1
SUSE-SU-2025_02853-1
SUSE-SU-2025_02969-1
SUSE-SU-2025_02996-1
SUSE-SU-2025_02997-1
SUSE-SU-2025_03011-1
SUSE-SU-2025_03023-1
SUSE-SU-2025_03204-1
SUSE-SU-2025_03310-1
SUSE-SU-2025_03314-1
SUSE-SU-2025_03344-1
USN-7769-1
USN-7769-2
USN-7769-3
USN-7770-1
USN-7771-1
USN-7774-1
USN-7774-2
USN-7774-3
USN-7774-4
USN-7774-5
USN-7775-1
USN-7775-2
USN-7775-3
USN-7776-1
USN-7789-1
USN-7789-2
USN-7853-1
USN-7853-2
USN-7853-3
USN-7854-1
USN-7861-1
USN-7861-2
USN-7861-3
USN-7861-4
USN-7861-5
USN-7863-1
USN-7864-1
USN-7865-1
USN-7874-1
USN-7874-2
USN-7874-3
USN-7875-1
USN-7935-1
USN-7937-1
USN-7939-1
USN-7939-2
USN-7940-1
USN-7940-2
USN-7986-1
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Linuxmint
Linux Kernel
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
References · 1854
- 🔥 https://github.com/farazsth98/chronomaly⭐ 263 🔗 37 · Exploit
- https://ubuntu.com/security/notices/USN-7853-2 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38066 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38114 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38575 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-23136 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-26726 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-22040 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38137 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38112 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38311 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7863-1 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38298 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-38058 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-22062 · Vendor Advisory