The vulnerabilities could allow threat actors to disrupt or access kernel activity and may be under active exploit.

Threatpost