Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11743

Browse all 11743 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

Found 11613 results / 11743Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2021-47197 net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47195 spi: fix use-after-free of the add_lock mutex — Linux 4.7AIMediumAI2024-04-10
CVE-2021-47193 scsi: pm80xx: Fix memory leak during rmmod — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47194 cfg80211: call cfg80211_stop_ap when switch from P2P_GO type — Linux 7.8AIHighAI2024-04-10
CVE-2021-47192 scsi: core: sysfs: Fix hang when device state is set via sysfs — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47190 perf bpf: Avoid memory leak from perf_env__insert_btf() — Linux 7.1AIHighAI2024-04-10
CVE-2021-47191 scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47188 scsi: ufs: core: Improve SCSI abort handling — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47189 btrfs: fix memory ordering between normal and ordered work functions — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47187 arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency — Linux 6.2AIMediumAI2024-04-10
CVE-2021-47185 tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc — Linux--AI2024-04-10
CVE-2021-47186 tipc: check for null after calling kmemdup — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47184 i40e: Fix NULL ptr dereference on VSI filter sync — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47182 scsi: core: Fix scsi_mode_sense() buffer length handling — Linux 7.1AIHighAI2024-04-10
CVE-2021-47183 scsi: lpfc: Fix link down processing to address NULL pointer dereference — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47181 usb: musb: tusb6010: check return value after calling platform_get_resource() — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26816 x86, relocs: Ignore relocations in .notes section — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26815 net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check — Linux 8.1AIHighAI2024-04-10
CVE-2024-26811 ksmbd: validate payload size in ipc response — Linux 7.1 -2024-04-08
CVE-2024-27437 vfio/pci: Disable auto-enable of exclusive INTx IRQ — Linux 7.7 -2024-04-05
CVE-2024-26814 vfio/fsl-mc: Block calling interrupt handler without trigger — Linux 6.2 -2024-04-05
CVE-2024-26812 vfio/pci: Create persistent INTx handler — Linux 7.1 -2024-04-05
CVE-2024-26813 vfio/platform: Create persistent IRQ handlers — Linux 5.5 -2024-04-05
CVE-2024-26810 vfio/pci: Lock external INTx masking ops — Linux 6.3 -2024-04-05
CVE-2024-26809 netfilter: nft_set_pipapo: release elements in clone only from destroy path — Linux 6.3 -2024-04-04
CVE-2024-26808 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain — Linux 5.5 -2024-04-04
CVE-2024-26806 spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks — Linux 7.1 -2024-04-04
CVE-2024-26807 spi: cadence-qspi: fix pointer reference in runtime PM hooks — Linux 7.8 -2024-04-04
CVE-2024-26805 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter — Linux 7.1 -2024-04-04
CVE-2024-26803 net: veth: clear GRO when clearing XDP even when down — Linux 7.8 -2024-04-04

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.