Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11726

Browse all 11726 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2026-43133 KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation — Linux 7.9 High2026-05-06
CVE-2026-43131 drm/amd/pm: Fix null pointer dereference issue — Linux--2026-05-06
CVE-2026-43132 dm-verity: correctly handle dm_bufio_client_create() failure — Linux--2026-05-06
CVE-2026-43130 iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode — Linux--2026-05-06
CVE-2026-43129 ima: verify the previous kernel's IMA buffer lies in addressable RAM — Linux--2026-05-06
CVE-2026-43127 ntfs3: fix circular locking dependency in run_unpack_ex — Linux--2026-05-06
CVE-2026-43128 RDMA/umem: Fix double dma_buf_unpin in failure path — Linux 7.8 High2026-05-06
CVE-2026-43126 ALSA: mixer: oss: Add card disconnect checkpoints — Linux 7.8 High2026-05-06
CVE-2026-43125 dlm: validate length in dlm_search_rsb_tree — Linux 9.8 Critical2026-05-06
CVE-2026-43124 pstore: ram_core: fix incorrect success return when vmap() fails — Linux--2026-05-06
CVE-2026-43123 fbcon: check return value of con2fb_acquire_newinfo() — Linux--2026-05-06
CVE-2026-43122 ACPI: processor: Update cpuidle driver check in __acpi_processor_start() — Linux--2026-05-06
CVE-2026-43121 io_uring/zcrx: fix user_ref race between scrub and refill paths — Linux--2026-05-06
CVE-2025-71274 rpmsg: core: fix race in driver_override_show() and use core helper — Linux--2026-05-06
CVE-2025-71273 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() — Linux--2026-05-06
CVE-2025-71272 most: core: fix resource leak in most_register_interface error paths — Linux--2026-05-06
CVE-2025-71271 hfsplus: ensure sb->s_fs_info is always cleaned up — Linux--2026-05-06
CVE-2026-43120 RDMA/irdma: Fix double free related to rereg_user_mr — Linux 7.8 High2026-05-06
CVE-2026-43118 btrfs: fix zero size inode with non-zero size after log replay — Linux--2026-05-06
CVE-2026-43119 Bluetooth: hci_sync: annotate data-races around hdev->req_status — Linux--2026-05-06
CVE-2026-43117 btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() — Linux 9.1 Critical2026-05-06
CVE-2026-43116 netfilter: ctnetlink: ensure safe access to master conntrack — Linux 7.8 High2026-05-06
CVE-2026-43115 srcu: Use irq_work to start GP in tiny SRCU — Linux--2026-05-06
CVE-2026-43114 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry — Linux 9.4 Critical2026-05-06
CVE-2026-43113 wifi: wl1251: validate packet IDs before indexing tx_frames — Linux 8.8 High2026-05-06
CVE-2026-43112 fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath — Linux 8.8 High2026-05-06
CVE-2026-43111 HID: roccat: fix use-after-free in roccat_report_event — Linux 7.8 High2026-05-06
CVE-2026-43109 x86: shadow stacks: proper error handling for mmap lock — Linux--2026-05-06
CVE-2026-43110 wifi: brcmfmac: validate bsscfg indices in IF events — Linux 8.8 High2026-05-06
CVE-2026-43108 soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei — Linux--2026-05-06

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.