Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Linux — Vulnerabilities & Security Advisories 11132

Browse all 11132 CVE security advisories affecting Linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2026-31474 can: isotp: fix tx.buf use-after-free in isotp_sendmsg() — Linux 7.1AIHighAI2026-04-22
CVE-2026-31473 media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex — Linux 7.1AIHighAI2026-04-22
CVE-2026-31471 xfrm: iptfs: only publish mode_data after clone setup — Linux 7.1AIHighAI2026-04-22
CVE-2026-31472 xfrm: iptfs: validate inner IPv4 header length in IPTFS payload — Linux 6.5AIMediumAI2026-04-22
CVE-2026-31470 virt: tdx-guest: Fix handling of host controlled 'quote' buffer length — Linux 7.7 -2026-04-22
CVE-2026-31469 virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false — Linux 9.8AICriticalAI2026-04-22
CVE-2026-31468 vfio/pci: Fix double free in dma-buf feature — Linux 7.8 -2026-04-22
CVE-2026-31467 erofs: add GFP_NOIO in the bio completion if needed — Linux 5.5 -2026-04-22
CVE-2026-31466 mm/huge_memory: fix folio isn't locked in softleaf_to_folio() — Linux 4.7 -2026-04-22
CVE-2026-31465 writeback: don't block sync for filesystems with no data integrity guarantees — Linux 6.3AIMediumAI2026-04-22
CVE-2026-31464 scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() — Linux 8.1AIHighAI2026-04-22
CVE-2026-31462 drm/amdgpu: prevent immediate PASID reuse case — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31463 iomap: fix invalid folio access when i_blkbits differs from I/O granularity — Linux 7.1AIHighAI2026-04-22
CVE-2026-31461 drm/amd/display: Fix drm_edid leak in amdgpu_dm — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31459 mm/damon/sysfs: fix param_ctx leak on damon_sysfs_new_test_ctx() failure — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31460 drm/amd/display: check if ext_caps is valid in BL setup — Linux 9.8AICriticalAI2026-04-22
CVE-2026-31458 mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] — Linux 4.4AIMediumAI2026-04-22
CVE-2026-31457 mm/damon/sysfs: check contexts->nr in repeat_call_fn — Linux 7.1AIHighAI2026-04-22
CVE-2026-31456 mm/pagewalk: fix race between concurrent split and refault — Linux 6.5AIMediumAI2026-04-22
CVE-2026-31455 xfs: stop reclaim before pushing AIL during unmount — Linux 7.0AIHighAI2026-04-22
CVE-2026-31454 xfs: save ailp before dropping the AIL lock in push callbacks — Linux 7.8AIHighAI2026-04-22
CVE-2026-31453 xfs: avoid dereferencing log items after push callbacks — Linux 7.1AIHighAI2026-04-22
CVE-2026-31452 ext4: convert inline data to extents when truncate exceeds inline size — Linux 7.1AIHighAI2026-04-22
CVE-2026-31451 ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31450 ext4: publish jinode after initialization — Linux 6.1AIMediumAI2026-04-22
CVE-2026-31449 ext4: validate p_idx bounds in ext4_ext_correct_indexes — Linux 7.8AIHighAI2026-04-22
CVE-2026-31448 ext4: avoid infinite loops caused by residual data — Linux 5.5AIMediumAI2026-04-22
CVE-2026-31446 ext4: fix use-after-free in update_super_work when racing with umount — Linux 7.3 -2026-04-22
CVE-2026-31447 ext4: reject mount if bigalloc with s_first_data_block != 0 — Linux 7.1AIHighAI2026-04-22
CVE-2026-31445 mm/damon/core: avoid use of half-online-committed context — Linux 7.1AIHighAI2026-04-22

This page lists every published CVE security advisory associated with Linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.