Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11726

Browse all 11726 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2026-43414 scsi: qla2xxx: Completely fix fcport double free — Linux--2026-05-08
CVE-2026-43415 scsi: ufs: core: Fix SError in ufshcd_rtc_work() during UFS suspend — Linux--2026-05-08
CVE-2026-43413 scsi: hisi_sas: Fix NULL pointer exception during user_scan() — Linux--2026-05-08
CVE-2026-43412 ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start — Linux--2026-05-08
CVE-2026-43411 tipc: fix divide-by-zero in tipc_sk_filter_connect() — Linux--2026-05-08
CVE-2026-43410 firmware: stratix10-rsu: Fix NULL pointer dereference when RSU is disabled — Linux--2026-05-08
CVE-2026-43409 kprobes: avoid crash when rmmod/insmod after ftrace killed — Linux--2026-05-08
CVE-2026-43408 ceph: add a bunch of missing ceph_path_info initializers — Linux--2026-05-08
CVE-2026-43407 libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() — Linux--2026-05-08
CVE-2026-43406 libceph: prevent potential out-of-bounds reads in process_message_header() — Linux--2026-05-08
CVE-2026-43405 libceph: Use u32 for non-negative values in ceph_monmap_decode() — Linux--2026-05-08
CVE-2026-43404 mm: Fix a hmm_range_fault() livelock / starvation problem — Linux--2026-05-08
CVE-2026-43402 kthread: consolidate kthread exit paths to prevent use-after-free — Linux--2026-05-08
CVE-2026-43403 nsfs: tighten permission checks for ns iteration ioctls — Linux--2026-05-08
CVE-2026-43401 cpufreq: intel_pstate: Fix NULL pointer dereference in update_cpu_qos_request() — Linux--2026-05-08
CVE-2026-43400 drm/amdgpu: add upper bound check on user inputs in signal ioctl — Linux--2026-05-08
CVE-2026-43399 drm/amdgpu/userq: Fix reference leak in amdgpu_userq_wait_ioctl — Linux--2026-05-08
CVE-2026-43398 drm/amdgpu: add upper bound check on user inputs in wait ioctl — Linux--2026-05-08
CVE-2026-43397 drm/bridge: samsung-dsim: Fix memory leak in error path — Linux--2026-05-08
CVE-2026-43395 drm/xe/sync: Cleanup partially initialized sync on parse failure — Linux--2026-05-08
CVE-2026-43396 drm/xe/sync: Fix user fence leak on alloc failure — Linux--2026-05-08
CVE-2026-43394 nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). — Linux--2026-05-08
CVE-2026-43392 sched_ext: Fix starvation of scx_enable() under fair-class saturation — Linux--2026-05-08
CVE-2026-43393 btrfs: fix chunk map leak in btrfs_map_block() after btrfs_chunk_map_num_copies() — Linux--2026-05-08
CVE-2026-43391 nsfs: tighten permission checks for handle opening — Linux--2026-05-08
CVE-2026-43390 nstree: tighten permission checks for listing — Linux--2026-05-08
CVE-2026-43389 mm: memfd_luo: always dirty all folios — Linux--2026-05-08
CVE-2026-43388 mm/damon/core: clear walk_control on inactive context in damos_walk() — Linux--2026-05-08
CVE-2026-43386 staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie — Linux--2026-05-08
CVE-2026-43387 staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() — Linux--2026-05-08

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.