PT-2025-30384 · Linux +11 · Linux Kernel +11
Published
2025-07-22
·
Updated
2026-01-13
·
CVE-2025-38352
CVSS v3.1
7.4
7.4
High
| Base vector | Vector | AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Linux kernel versions prior to 6.1.153-1~deb11u1
Linux kernel versions 5.10.244-1
Linux kernel versions prior to 5.10.244-1
Linux kernel (affected versions not specified)
Description
The Linux kernel contains vulnerabilities that may lead to privilege escalation, denial of service, or information leaks. The kernel packages contain the core of any Linux operating system. A race condition exists in the deb11u1 and 5.10.244-1. Starting with version 5.10.244-1, modules are signed with an ephemeral key on all architectures, and the hyperv-daemons package is also provided on arm64. The broken pktcdvd driver is disabled in version 6.1.153-1deb11u1.
posix-cpu-timers functionality. Several vulnerabilities have been discovered in the Linux kernel. For Debian 11 bullseye, these issues have been addressed in version 6.1.153-1Recommendations
For Linux kernel versions prior to 6.1.153-1deb11u1, upgrade to version 6.1.153-1deb11u1 or later.
For Linux kernel versions prior to 5.10.244-1, upgrade to version 5.10.244-1 or later.
For Linux kernel versions without a specified fix, upgrade to a newer version.
Exploit
Fix
LPE
Race Condition
Time Of Check To Time Of Use
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
ALSA-2025:15471
ALSA-2025:15472
ALSA-2025:15661
ALSA-2025:15662
ALT-PU-2025-12647
ASB-A-425282960
BDU:2025-10870
CESA-2025_15471
CESA-2025_15472
CESA-2025_15921
CVE-2025-38352
DLA-4327-1
DLA-4328-1
DSA-5973-1
ECHO-11F2-D185-A1F8
INFSA-2025_15471
INFSA-2025_15472
INFSA-2025_15661
LSN-0116-1
MGASA-2025-0218
MGASA-2025-0219
OESA-2025-2002
OESA-2025-2003
OESA-2025-2004
OESA-2025-2005
OESA-2025-2006
OESA-2025-2553
RHSA-2025:15662
RHSA-2025_15471
RHSA-2025_15472
RHSA-2025_15661
SUSE-SU-2025:02853-1
SUSE-SU-2025:02923-1
SUSE-SU-2025:02969-1
SUSE-SU-2025:03023-1
SUSE-SU-2025:03283-1
SUSE-SU-2025:03314-1
SUSE-SU-2025:4315-1
SUSE-SU-2025_02853-1
SUSE-SU-2025_02969-1
SUSE-SU-2025_02996-1
SUSE-SU-2025_02997-1
SUSE-SU-2025_03011-1
SUSE-SU-2025_03023-1
SUSE-SU-2025_03204-1
SUSE-SU-2025_03310-1
SUSE-SU-2025_03314-1
SUSE-SU-2025_03344-1
USN-7769-1
USN-7769-2
USN-7769-3
USN-7770-1
USN-7771-1
USN-7774-1
USN-7774-2
USN-7774-3
USN-7774-4
USN-7774-5
USN-7775-1
USN-7775-2
USN-7775-3
USN-7776-1
USN-7789-1
USN-7789-2
USN-7853-1
USN-7853-2
USN-7853-3
USN-7854-1
USN-7861-1
USN-7861-2
USN-7861-3
USN-7861-4
USN-7863-1
USN-7864-1
USN-7865-1
USN-7874-1
USN-7874-2
USN-7875-1
USN-7935-1
USN-7939-1
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Linuxmint
Linux Kernel
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
References · 5736
- 🔥 https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9Exploit⭐ 212425 🔗 59714 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/mediawiki_syntaxhighlight.rb⭐ 37232 🔗 14693 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_ccs.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/apache_normalize_path.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/af_packet_chocobo_root_priv_esc.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/torchserver_cve_2023_43654.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/ssl/openssl_aesni.rb⭐ 37173 🔗 14688 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/rails_doubletap_file_read.rb⭐ 37169 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_double_tap.rb⭐ 37169 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/ssl/dtls_fragment_overflow.rb⭐ 37168 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_runc_escape.rb⭐ 37168 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb⭐ 37168 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssh/ssh_version.rb⭐ 37168 🔗 14686 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/firefox_svg_plugin.rb⭐ 37168 🔗 14686 · Exploit