Linux Vulnerabilities

Comprehensive security vulnerability database for Linux products

Last updated: Jun 6, 2025
Total CVEs

2

Critical

0

With Exploits

4

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
100%
Medium2
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-380015.5

This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings.

linuxlinux kernel
Exploit Available
10 months agoJun 6, 2025
CVE-2025-218365.5

This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings.

linuxlinux kernel
Exploit Available
about 1 year agoMar 7, 2025

About Linux Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Linux products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.