Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2024-26954 ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() — Linux 7.8AIHighAI2024-05-01
CVE-2024-26953 net: esp: fix bad handling of pages from page_pool — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26952 ksmbd: fix potencial out-of-bounds when buffer offset is invalid — Linux 7.8AIHighAI2024-05-01
CVE-2024-26951 wireguard: netlink: check for dangling peer via is_dead instead of empty list — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26950 wireguard: netlink: access device through ctx instead of peer — Linux 7.1AIHighAI2024-05-01
CVE-2024-26949 drm/amdgpu/pm: Fix NULL pointer dereference when get power limit — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26948 drm/amd/display: Add a dc_state NULL check in dc_state_release — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26947 ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26946 kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26945 crypto: iaa - Fix nr_cpus < nr_iaa case — Linux 6.5AIMediumAI2024-05-01
CVE-2024-26944 btrfs: zoned: fix use-after-free in do_zone_finish() — Linux 8.4AIHighAI2024-05-01
CVE-2024-26943 nouveau/dmem: handle kcalloc() allocation failure — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26942 net: phy: qcom: at803x: fix kernel panic with at8031_probe — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26941 drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveau — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26940 drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26939 drm/i915/vma: Fix UAF on destroy against retire race — Linux 7.0AIHighAI2024-05-01
CVE-2024-26938 drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() — Linux 5.5AIMediumAI2024-05-01
CVE-2024-26937 drm/i915/gt: Reset queue_priority_hint on parking — Linux 7.0AIHighAI2024-05-01
CVE-2024-26935 scsi: core: Fix unremoved procfs host directory regression — Linux 7.1AIHighAI2024-05-01
CVE-2024-26934 USB: core: Fix deadlock in usb_deauthorize_interface() — Linux 6.2AIMediumAI2024-05-01
CVE-2024-26933 USB: core: Fix deadlock in port "disable" sysfs attribute — Linux 7.7AIHighAI2024-05-01
CVE-2024-26932 usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() — Linux 7.8AIHighAI2024-05-01
CVE-2024-26931 scsi: qla2xxx: Fix command flush on cable pull — Linux 5.5 -2024-05-01
CVE-2024-26930 scsi: qla2xxx: Fix double free of the ha->vp_map pointer — Linux 7.1 -2024-05-01
CVE-2023-52648 drm/vmwgfx: Unmap the surface before resetting it on a plane state — Linux 7.5 -2024-05-01
CVE-2023-52647 media: nxp: imx8-isi: Check whether crossbar pad is non-NULL before access — Linux 6.2 -2024-05-01
CVE-2022-48668 smb3: fix temporary data corruption in collapse range — Linux 7.1 -2024-04-28
CVE-2022-48667 smb3: fix temporary data corruption in insert range — Linux 7.1 -2024-04-28
CVE-2022-48666 scsi: core: Fix a use-after-free — Linux 7.8 -2024-04-28
CVE-2022-48665 exfat: fix overflow for large capacity partition — Linux 7.8 -2024-04-28

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.