Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

linux — Vulnerabilities & Security Advisories 11727

Browse all 11727 CVE security advisories affecting linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Linux serves as the foundational operating system for the majority of internet servers, cloud infrastructure, and embedded devices, powering critical global digital services. Its open-source nature and widespread deployment have historically exposed it to diverse vulnerability classes, including remote code execution, buffer overflows, and privilege escalation flaws within kernel modules and system utilities. While the project maintains rigorous security practices, the sheer volume of code contributes to a high cumulative count of recorded Common Vulnerabilities and Exposures, currently exceeding eleven thousand. Notable incidents often stem from misconfigurations or unpatched legacy components rather than fundamental architectural failures. The community responds rapidly to disclosed threats, yet the extensive attack surface necessitates continuous vigilance. Administrators must prioritize regular updates and strict access controls to mitigate risks associated with this ubiquitous platform, ensuring stability across both enterprise and consumer environments.

CVE IDTitleCVSSSeverityPublished
CVE-2026-31652 mm/damon/stat: deallocate damon_call() failure leaking damon_ctx — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31651 mmc: vub300: fix NULL-deref on disconnect — Linux 7.8AIHighAI2026-04-24
CVE-2026-31649 net: stmmac: fix integer underflow in chain mode — Linux 9.8 Critical2026-04-24
CVE-2026-31650 mmc: vub300: fix use-after-free on disconnect — Linux 7.1AIHighAI2026-04-24
CVE-2026-31648 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() — Linux 7.8 High2026-04-24
CVE-2026-31647 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling — Linux 7.1AIHighAI2026-04-24
CVE-2026-31646 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() — Linux 7.1AIHighAI2026-04-24
CVE-2026-31645 net: lan966x: fix page pool leak in error paths — Linux 7.1AIHighAI2026-04-24
CVE-2026-31644 net: lan966x: fix use-after-free and leak in lan966x_fdma_reload() — Linux 7.8 High2026-04-24
CVE-2026-31643 rxrpc: Fix key parsing memleak — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31642 rxrpc: Fix call removal to use RCU safe deletion — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31641 rxrpc: Fix RxGK token loading to check bounds — Linux 7.8 High2026-04-24
CVE-2026-31640 rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial — Linux 7.5 High2026-04-24
CVE-2026-31639 rxrpc: Fix key reference count leak from call->key — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31638 rxrpc: Only put the call ref if one was acquired — Linux 7.5 High2026-04-24
CVE-2026-31637 rxrpc: reject undecryptable rxkad response tickets — Linux 9.8 Critical2026-04-24
CVE-2026-31636 rxrpc: fix RESPONSE authenticator parser OOB read — Linux 9.1 Critical2026-04-24
CVE-2026-31635 rxrpc: fix oversized RESPONSE authenticator length check — Linux 7.5 High2026-04-24
CVE-2026-31633 rxrpc: Fix integer overflow in rxgk_verify_response() — Linux 9.8 Critical2026-04-24
CVE-2026-31634 rxrpc: fix reference count leak in rxrpc_server_keyring() — Linux 7.1AIHighAI2026-04-24
CVE-2026-31632 rxrpc: Fix leak of rxgk context in rxgk_verify_response() — Linux 3.3 -2026-04-24
CVE-2026-31630 rxrpc: proc: size address buffers for %pISpc output — Linux 7.8 High2026-04-24
CVE-2026-31631 rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() — Linux 8.2 High2026-04-24
CVE-2026-31629 nfc: llcp: add missing return after LLCP_CLOSED checks — Linux 8.8 High2026-04-24
CVE-2026-31628 x86/CPU: Fix FPDSS on Zen1 — Linux 5.5 -2026-04-24
CVE-2026-31627 i2c: s3c24xx: check the size of the SMBUS message before using it — Linux 7.8 High2026-04-24
CVE-2026-31626 staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() — Linux 7.1 High2026-04-24
CVE-2026-31624 HID: core: clamp report_size in s32ton() to avoid undefined shift — Linux 7.7 -2026-04-24
CVE-2026-31625 HID: alps: fix NULL pointer dereference in alps_raw_event() — Linux 5.5AIMediumAI2026-04-24
CVE-2026-31623 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() — Linux 6.8AIMediumAI2026-04-24

This page lists every published CVE security advisory associated with linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.