Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11726

Browse all 11726 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2026-43385 net: Fix rcu_tasks stall in threaded busypoll — Linux--2026-05-08
CVE-2026-43383 net/tcp-md5: Fix MAC comparison to be constant-time — Linux--2026-05-08
CVE-2026-43384 net/tcp-ao: Fix MAC comparison to be constant-time — Linux--2026-05-08
CVE-2026-43382 batman-adv: Avoid double-rtnl_lock ELP metric worker — Linux--2026-05-08
CVE-2026-43380 hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read — Linux--2026-05-08
CVE-2026-43381 nouveau/dpcd: return EBUSY for aux xfer if the device is asleep — Linux--2026-05-08
CVE-2026-43379 ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() — Linux--2026-05-08
CVE-2026-43378 smb: server: fix use-after-free in smb2_open() — Linux--2026-05-08
CVE-2026-43377 ksmbd: Don't log keys in SMB3 signing and encryption key generation — Linux--2026-05-08
CVE-2026-43376 ksmbd: fix use-after-free by using call_rcu() for oplock_info — Linux--2026-05-08
CVE-2026-43374 net: nexthop: fix percpu use-after-free in remove_nh_grp_entry — Linux--2026-05-08
CVE-2026-43375 net: mctp: fix device leak on probe failure — Linux--2026-05-08
CVE-2026-43373 net: ncsi: fix skb leak in error paths — Linux--2026-05-08
CVE-2026-43372 net: dsa: microchip: Fix error path in PTP IRQ setup — Linux--2026-05-08
CVE-2026-43371 net: macb: Shuffle the tx ring before enabling tx — Linux--2026-05-08
CVE-2026-43370 drm/amdgpu: Fix use-after-free race in VM acquire — Linux--2026-05-08
CVE-2026-43369 drm/amd: Fix NULL pointer dereference in device cleanup — Linux--2026-05-08
CVE-2026-43368 drm/i915: Fix potential overflow of shmem scatterlist length — Linux--2026-05-08
CVE-2026-43367 drm/amd: Fix a few more NULL pointer dereference in device cleanup — Linux--2026-05-08
CVE-2026-43366 io_uring/kbuf: check if target buffer list is still legacy on recycle — Linux--2026-05-08
CVE-2026-43365 xfs: fix undersized l_iclog_roundoff values — Linux--2026-05-08
CVE-2026-43364 ublk: fix NULL pointer dereference in ublk_ctrl_set_size() — Linux--2026-05-08
CVE-2026-43363 x86/apic: Disable x2apic on resume if the kernel expects so — Linux--2026-05-08
CVE-2026-43361 btrfs: fix transaction abort when snapshotting received subvolumes — Linux--2026-05-08
CVE-2026-43362 smb: client: fix in-place encryption corruption in SMB2_write() — Linux--2026-05-08
CVE-2026-43360 btrfs: fix transaction abort on file creation due to name hash collision — Linux--2026-05-08
CVE-2026-43359 btrfs: fix transaction abort on set received ioctl due to item overflow — Linux--2026-05-08
CVE-2026-43358 btrfs: add missing RCU unlock in error path in try_release_subpage_extent_buffer() — Linux--2026-05-08
CVE-2026-43357 iio: gyro: mpu3050-core: fix pm_runtime error handling — Linux--2026-05-08
CVE-2026-43356 iio: imu: adis: Fix NULL pointer dereference in adis_init — Linux--2026-05-08

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.