Linux Vulnerabilities
Comprehensive security vulnerability database for Linux products
4
0
4
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-38001 | 5.5 | This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings. | linuxlinux kernel | Exploit Available | 10 months agoJun 6, 2025 |
| CVE-2025-21836 | 5.5 | This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings. | linuxlinux kernel | Exploit Available | about 1 year agoMar 7, 2025 |
| CVE-2021-3347 | 7.8 | This vulnerability allows an attacker with local access to a Linux system to run malicious code in the kernel, potentially taking control of the system. It occurs due to a flaw in how the kernel handles certain errors, and it affects versions of the Linux kernel up to 5.10.11. | linuxlinux kernel | Exploit Available | about 5 years agoJan 29, 2021 |
| CVE-2020-14381 | 7.8 | This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex. | linuxlinux kernel | Exploit Available | over 5 years agoDec 3, 2020 |
About Linux Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Linux products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.