Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

Found 11597 results / 11727Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-26695 crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked — Linux 6.5 -2024-04-03
CVE-2024-26694 wifi: iwlwifi: fix double-free bug — Linux 7.0 -2024-04-03
CVE-2024-26693 wifi: iwlwifi: mvm: fix a crash when we run out of stations — Linux 5.5 -2024-04-03
CVE-2024-26691 KVM: arm64: Fix circular locking dependency — Linux 8.8 -2024-04-03
CVE-2024-26692 smb: Fix regression in writes when non-standard maximum write size negotiated — Linux 8.1 -2024-04-03
CVE-2024-26690 net: stmmac: protect updates of 64-bit statistics counters — Linux 5.5 -2024-04-03
CVE-2024-26689 ceph: prevent use-after-free in encode_cap_msg() — Linux 8.8 -2024-04-03
CVE-2024-26688 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super — Linux 5.5 -2024-04-03
CVE-2024-26686 fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats — Linux 5.5 -2024-04-03
CVE-2024-26687 xen/events: close evtchn after mapping cleanup — Linux 6.3 -2024-04-03
CVE-2024-26685 nilfs2: fix potential bug in end_buffer_async_write — Linux 7.1 -2024-04-03
CVE-2023-52639 KVM: s390: vsie: fix race during shadow creation — Linux 4.7 -2024-04-03
CVE-2023-52638 can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock — Linux 4.7 -2024-04-03
CVE-2023-52637 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) — Linux 9.1 -2024-04-03
CVE-2024-26684 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels — Linux 5.5AIMediumAI2024-04-02
CVE-2024-26683 wifi: cfg80211: detect stuck ECSA element in probe resp — Linux 8.1AIHighAI2024-04-02
CVE-2024-26681 netdevsim: avoid potential loop in nsim_dev_trap_report_work() — Linux 7.1AIHighAI2024-04-02
CVE-2024-26682 wifi: mac80211: improve CSA/ECSA connection refusal — Linux 8.1AIHighAI2024-04-02
CVE-2024-26680 net: atlantic: Fix DMA mapping for PTP hwts ring — Linux 8.8AIHighAI2024-04-02
CVE-2024-26679 inet: read sk->sk_family once in inet_recv_error() — Linux 8.1AIHighAI2024-04-02
CVE-2024-26677 rxrpc: Fix delayed ACKs to not set the reference serial number — Linux 7.1AIHighAI2024-04-02
CVE-2024-26678 x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section — Linux 5.5AIMediumAI2024-04-02
CVE-2024-26676 af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. — Linux 5.5AIMediumAI2024-04-02
CVE-2024-26675 ppp_async: limit MRU to 64K — Linux 5.5AIMediumAI2024-04-02
CVE-2024-26674 x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups — Linux 5.5AIMediumAI2024-04-02
CVE-2023-52636 libceph: just wait for more data to be available on the socket — Linux 8.1AIHighAI2024-04-02
CVE-2024-26673 netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations — Linux 8.1AIHighAI2024-04-02
CVE-2024-26672 drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' — Linux 5.5AIMediumAI2024-04-02
CVE-2024-26671 blk-mq: fix IO hang from sbitmap wakeup race — Linux 3.3AILowAI2024-04-02
CVE-2023-52635 PM / devfreq: Synchronize devfreq_monitor_[start/stop] — Linux 5.5AIMediumAI2024-04-02

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.