Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2024-26870 NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 — Linux--2024-04-17
CVE-2024-26871 f2fs: fix NULL pointer dereference in f2fs_submit_page_write() — Linux 5.5 -2024-04-17
CVE-2024-26869 f2fs: fix to truncate meta inode pages forcely — Linux 7.0 -2024-04-17
CVE-2024-26867 comedi: comedi_8255: Correct error in subdevice initialization — Linux 7.1 -2024-04-17
CVE-2024-26868 nfs: fix panic when nfs4_ff_layout_prepare_ds() fails — Linux 5.5 -2024-04-17
CVE-2024-26865 rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). — Linux 9.8 -2024-04-17
CVE-2024-26866 spi: lpspi: Avoid potential use-after-free in probe() — Linux 7.1 -2024-04-17
CVE-2024-26864 tcp: Fix refcnt handling in __inet_hash_connect(). — Linux 8.1 -2024-04-17
CVE-2024-26862 packet: annotate data-races around ignore_outgoing — Linux 6.8 -2024-04-17
CVE-2024-26863 hsr: Fix uninit-value access in hsr_get_node() — Linux 7.1 -2024-04-17
CVE-2024-26861 wireguard: receive: annotate data-race around receiving_counter.counter — Linux 7.0 -2024-04-17
CVE-2024-26859 net/bnx2x: Prevent access to a freed page in page_pool — Linux 4.7 -2024-04-17
CVE-2024-26860 dm-integrity: fix a memory leak when rechecking the data — Linux--2024-04-17
CVE-2023-52644 wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled — Linux 5.9 -2024-04-17
CVE-2024-26858 net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map — Linux 5.5 -2024-04-17
CVE-2024-26857 geneve: make sure to pull inner header in geneve_rx() — Linux 7.1 -2024-04-17
CVE-2024-26855 net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() — Linux 5.5 -2024-04-17
CVE-2024-26856 net: sparx5: Fix use after free inside sparx5_del_mact_entry — Linux 7.8 -2024-04-17
CVE-2024-26853 igc: avoid returning frame twice in XDP_REDIRECT — Linux 7.1 -2024-04-17
CVE-2024-26854 ice: fix uninitialized dplls mutex usage — Linux 7.8 -2024-04-17
CVE-2024-26852 net/ipv6: avoid possible UAF in ip6_route_mpath_notify() — Linux 7.8AIHighAI2024-04-17
CVE-2024-26851 netfilter: nf_conntrack_h323: Add protection for bmp length out of range — Linux 7.1 -2024-04-17
CVE-2024-26850 mm/debug_vm_pgtable: fix BUG_ON with pud advanced test — Linux 7.1 -2024-04-17
CVE-2024-26849 netlink: add nla be16/32 types to minlen array — Linux 7.8 -2024-04-17
CVE-2024-26847 powerpc/rtas: use correct function name for resetting TCE tables — Linux 7.1 -2024-04-17
CVE-2024-26846 nvme-fc: do not wait in vain when unloading module — Linux 6.3 -2024-04-17
CVE-2024-26844 block: Fix WARNING in _copy_from_iter — Linux 7.1 -2024-04-17
CVE-2024-26845 scsi: target: core: Add TMF to tmr_list handling — Linux 5.5 -2024-04-17
CVE-2024-26843 efi: runtime: Fix potential overflow of soft-reserved region size — Linux 7.8 -2024-04-17
CVE-2024-26841 LoongArch: Update cpu_sibling_map when disabling nonboot CPUs — Linux 3.3 -2024-04-17

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.