4
0
4
0
Vulnerability Timeline
4 vulnerabilities discovered over time for Linux kernel
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-38001 | 5.5 | This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings. | linuxlinux kernel | Exploit Available | 10 months agoJun 6, 2025 |
| CVE-2025-21836 | 5.5 | This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings. | linuxlinux kernel | Exploit Available | about 1 year agoMar 7, 2025 |
| CVE-2021-3347 | 7.8 | This vulnerability allows an attacker with local access to a Linux system to run malicious code in the kernel, potentially taking control of the system. It occurs due to a flaw in how the kernel handles certain errors, and it affects versions of the Linux kernel up to 5.10.11. | linuxlinux kernel | Exploit Available | about 5 years agoJan 29, 2021 |
| CVE-2020-14381 | 7.8 | This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex. | linuxlinux kernel | Exploit Available | over 5 years agoDec 3, 2020 |
About Linux Linux kernel Security
This page provides comprehensive security vulnerability tracking for Linux Linux kernel. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Linux kernel updated to the latest version
- • Subscribe to security advisories from Linux
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately