2
0
4
0
Vulnerability Timeline
2 vulnerabilities discovered over time for Linux kernel
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2021-3347 | 7.8 | This vulnerability allows an attacker with local access to a Linux system to run malicious code in the kernel, potentially taking control of the system. It occurs due to a flaw in how the kernel handles certain errors, and it affects versions of the Linux kernel up to 5.10.11. | linuxlinux kernel | Exploit Available | about 5 years agoJan 29, 2021 |
| CVE-2020-14381 | 7.8 | This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex. | linuxlinux kernel | Exploit Available | over 5 years agoDec 3, 2020 |
About Linux Linux kernel Security
This page provides comprehensive security vulnerability tracking for Linux Linux kernel. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Linux kernel updated to the latest version
- • Subscribe to security advisories from Linux
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately