2
0
4
0
Vulnerability Timeline
2 vulnerabilities discovered over time for Linux kernel
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-38001 | 5.5 | This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings. | linuxlinux kernel | Exploit Available | 10 months agoJun 6, 2025 |
| CVE-2025-21836 | 5.5 | This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings. | linuxlinux kernel | Exploit Available | about 1 year agoMar 7, 2025 |
About Linux Linux kernel Security
This page provides comprehensive security vulnerability tracking for Linux Linux kernel. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Linux kernel updated to the latest version
- • Subscribe to security advisories from Linux
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately