Linux Vulnerabilities

Comprehensive security vulnerability database for Linux products

Last updated: Jan 29, 2021
Total CVEs

2

Critical

0

With Exploits

4

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
100%
Medium2
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2021-33477.8

This vulnerability allows an attacker with local access to a Linux system to run malicious code in the kernel, potentially taking control of the system. It occurs due to a flaw in how the kernel handles certain errors, and it affects versions of the Linux kernel up to 5.10.11.

linuxlinux kernel
Exploit Available
about 5 years agoJan 29, 2021
CVE-2020-143817.8

This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex.

linuxlinux kernel
Exploit Available
over 5 years agoDec 3, 2020

About Linux Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Linux products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.