Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2021-47181 usb: musb: tusb6010: check return value after calling platform_get_resource() — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26816 x86, relocs: Ignore relocations in .notes section — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26815 net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check — Linux 8.1AIHighAI2024-04-10
CVE-2024-26811 ksmbd: validate payload size in ipc response — Linux 7.1 -2024-04-08
CVE-2024-27437 vfio/pci: Disable auto-enable of exclusive INTx IRQ — Linux 7.7 -2024-04-05
CVE-2024-26814 vfio/fsl-mc: Block calling interrupt handler without trigger — Linux 6.2 -2024-04-05
CVE-2024-26812 vfio/pci: Create persistent INTx handler — Linux 7.1 -2024-04-05
CVE-2024-26813 vfio/platform: Create persistent IRQ handlers — Linux 5.5 -2024-04-05
CVE-2024-26810 vfio/pci: Lock external INTx masking ops — Linux 6.3 -2024-04-05
CVE-2024-26809 netfilter: nft_set_pipapo: release elements in clone only from destroy path — Linux 6.3 -2024-04-04
CVE-2024-26808 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain — Linux 5.5 -2024-04-04
CVE-2024-26806 spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks — Linux 7.1 -2024-04-04
CVE-2024-26807 spi: cadence-qspi: fix pointer reference in runtime PM hooks — Linux 7.8 -2024-04-04
CVE-2024-26805 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter — Linux 7.1 -2024-04-04
CVE-2024-26803 net: veth: clear GRO when clearing XDP even when down — Linux 7.8 -2024-04-04
CVE-2024-26804 net: ip_tunnel: prevent perpetual headroom growth — Linux 7.1 -2024-04-04
CVE-2024-26802 stmmac: Clear variable when destroying workqueue — Linux 5.5 -2024-04-04
CVE-2024-26801 Bluetooth: Avoid potential use-after-free in hci_error_reset — Linux 8.1 -2024-04-04
CVE-2024-26800 tls: fix use-after-free on failed backlog decryption — Linux--2024-04-04
CVE-2024-26799 ASoC: qcom: Fix uninitialized pointer dmactl — Linux 5.5 -2024-04-04
CVE-2024-26797 drm/amd/display: Prevent potential buffer overflow in map_hw_resources — Linux 7.8 -2024-04-04
CVE-2024-26798 fbcon: always restore the old font data in fbcon_do_set_font() — Linux 7.1 -2024-04-04
CVE-2024-26796 drivers: perf: ctr_get_width function for legacy is not defined — Linux 5.5 -2024-04-04
CVE-2024-26795 riscv: Sparse-Memory/vmemmap out-of-bounds fix — Linux 7.1 -2024-04-04
CVE-2024-26793 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() — Linux 7.1 -2024-04-04
CVE-2024-26792 btrfs: fix double free of anonymous device after snapshot creation failure — Linux 7.8 -2024-04-04
CVE-2024-26790 dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read — Linux 5.5 -2024-04-04
CVE-2024-26791 btrfs: dev-replace: properly validate device names — Linux 7.1 -2024-04-04
CVE-2024-26789 crypto: arm64/neonbs - fix out-of-bounds access on short input — Linux 9.8 -2024-04-04
CVE-2024-26787 mmc: mmci: stm32: fix DMA API overlapping mappings warning — Linux 5.5 -2024-04-04

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.