Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11132

Browse all 11132 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2026-31504 net: fix fanout UAF in packet_release() via NETDEV_UP race — Linux 7.4AIHighAI2026-04-22
CVE-2026-31503 udp: Fix wildcard bind conflict check when using hash2 — Linux 9.1AICriticalAI2026-04-22
CVE-2026-31502 team: fix header_ops type confusion with non-Ethernet ports — Linux 7.8AIHighAI2026-04-22
CVE-2026-31501 net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path — Linux 7.1AIHighAI2026-04-22
CVE-2026-31500 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock — Linux 6.8AIMediumAI2026-04-22
CVE-2026-31498 Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop — Linux 6.5AIMediumAI2026-04-22
CVE-2026-31499 Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del() — Linux 6.5AIMediumAI2026-04-22
CVE-2026-31497 Bluetooth: btusb: clamp SCO altsetting table indices — Linux 6.5AIMediumAI2026-04-22
CVE-2026-31495 netfilter: ctnetlink: use netlink policy range checks — Linux 7.7 -2026-04-22
CVE-2026-31496 netfilter: nf_conntrack_expect: skip expectations in other netns via proc — Linux 6.1AIMediumAI2026-04-22
CVE-2026-31494 net: macb: use the current queue number for stats — Linux 7.8AIHighAI2026-04-22
CVE-2026-31493 RDMA/efa: Fix use of completion ctx after free — Linux 7.1 -2026-04-22
CVE-2026-31492 RDMA/irdma: Initialize free_qp completion before using it — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31491 RDMA/irdma: Harden depth calculation functions — Linux 7.8AIHighAI2026-04-22
CVE-2026-31489 spi: meson-spicc: Fix double-put in remove path — Linux 7.1AIHighAI2026-04-22
CVE-2026-31490 drm/xe/pf: Fix use-after-free in migration restore — Linux 7.8AIHighAI2026-04-22
CVE-2026-31488 drm/amd/display: Do not skip unrelated mode changes in DSC validation — Linux 4.7AIMediumAI2026-04-22
CVE-2026-31487 spi: use generic driver_override infrastructure — Linux 7.1AIHighAI2026-04-22
CVE-2026-31486 hwmon: (pmbus/core) Protect regulator operations with mutex — Linux 4.7 -2026-04-22
CVE-2026-31485 spi: spi-fsl-lpspi: fix teardown order issue (UAF) — Linux 5.5 -2026-04-22
CVE-2026-31483 s390/syscalls: Add spectre boundary for syscall dispatch table — Linux 7.8 -2026-04-22
CVE-2026-31484 io_uring/fdinfo: fix OOB read in SQE_MIXED wrap check — Linux 7.1AIHighAI2026-04-22
CVE-2026-31482 s390/entry: Scrub r12 register on kernel entry — Linux 7.1AIHighAI2026-04-22
CVE-2026-31481 tracing: Drain deferred trigger frees if kthread creation fails — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31480 tracing: Fix potential deadlock in cpu hotplug with osnoise — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31479 drm/xe: always keep track of remap prev/next — Linux 7.1 -2026-04-22
CVE-2026-31478 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() — Linux 7.1AIHighAI2026-04-22
CVE-2026-31477 ksmbd: fix memory leaks and NULL deref in smb2_lock() — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31476 ksmbd: do not expire session on binding failure — Linux 9.1AICriticalAI2026-04-22
CVE-2026-31475 ASoC: sma1307: fix double free of devm_kzalloc() memory — Linux 7.8AIHighAI2026-04-22

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.