Linux Vulnerabilities
Comprehensive security vulnerability database for Linux products
2
0
4
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-38001 | 5.5 | This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings. | linuxlinux kernel | Exploit Available | 10 months agoJun 6, 2025 |
| CVE-2025-21836 | 5.5 | This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings. | linuxlinux kernel | Exploit Available | about 1 year agoMar 7, 2025 |
About Linux Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Linux products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.