Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

Found 11597 results / 11727Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-31562 drm/mediatek: dsi: Store driver data before invoking mipi_dsi_host_register — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31560 spi: spi-dw-dma: fix print error log when wait finish transaction — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31561 x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask — Linux 4.7 -2026-04-24
CVE-2026-31559 LoongArch: Fix missing NULL checks for kstrdup() — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31557 nvmet: move async event work off nvmet-wq — Linux 7.5 High2026-04-24
CVE-2026-31558 LoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust — Linux 8.8 High2026-04-24
CVE-2026-31556 xfs: scrub: unlock dquot before early return in quota scrub — Linux 7.3AIHighAI2026-04-24
CVE-2026-31555 futex: Clear stale exiting pointer in futex_lock_pi() retry path — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31554 futex: Require sys_futex_requeue() to have identical flags — Linux 7.8 High2026-04-24
CVE-2026-31553 KVM: arm64: Fix the descriptor address in __kvm_at_swap_desc() — Linux 8.8 High2026-04-24
CVE-2026-31552 wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom — Linux 7.5 High2026-04-24
CVE-2026-31551 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. — Linux 8.8 -2026-04-24
CVE-2026-31550 pmdomain: bcm: bcm2835-power: Increase ASB control timeout — Linux 5.5 -2026-04-24
CVE-2026-31549 i2c: cp2615: fix serial string NULL-deref at probe — Linux 4.6AIMediumAI2026-04-24
CVE-2026-31548 wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down — Linux 7.8 High2026-04-24
CVE-2026-31547 drm/xe: Fix missing runtime PM reference in ccs_mode_store — Linux 7.1AIHighAI2026-04-24
CVE-2026-31546 net: bonding: fix NULL deref in bond_debug_rlb_hash_show — Linux 6.5AIMediumAI2026-04-24
CVE-2026-31545 NFC: nxp-nci: allow GPIOs to sleep — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31544 firmware: arm_scmi: Fix NULL dereference on notify error path — Linux 6.2AIMediumAI2026-04-24
CVE-2026-31543 crash_dump: don't log dm-crypt key bytes in read_key_from_user_keying — Linux 6.5 -2026-04-24
CVE-2026-31542 x86/platform/uv: Handle deconfigured sockets — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31541 tracing: Fix trace_marker copy link list updates — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31540 drm/i915/gt: Check set_default_submission() before deferencing — Linux 7.1AIHighAI2026-04-24
CVE-2026-31539 smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available — Linux 7.5 High2026-04-24
CVE-2026-31538 smb: server: make use of smbdirect_socket.recv_io.credits.available — Linux 7.5 High2026-04-24
CVE-2026-31537 smb: server: make use of smbdirect_socket.send_io.bcredits — Linux 7.1AIHighAI2026-04-24
CVE-2026-31536 smb: server: let send_done handle a completion without IB_SEND_SIGNALED — Linux 9.8 Critical2026-04-24
CVE-2026-31535 smb: client: make use of smbdirect_socket.recv_io.credits.available — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31533 net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption — Linux 9.8 Critical2026-04-23
CVE-2026-31532 can: raw: fix ro->uniq use-after-free in raw_rcv() — Linux 7.8 High2026-04-23

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.