Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

linux — Vulnerabilities & Security Advisories 11138

Browse all 11138 CVE security advisories affecting linux. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2021-47192 scsi: core: sysfs: Fix hang when device state is set via sysfs — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47190 perf bpf: Avoid memory leak from perf_env__insert_btf() — Linux 7.1AIHighAI2024-04-10
CVE-2021-47191 scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47188 scsi: ufs: core: Improve SCSI abort handling — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47189 btrfs: fix memory ordering between normal and ordered work functions — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47187 arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency — Linux 6.2AIMediumAI2024-04-10
CVE-2021-47185 tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc — Linux--AI2024-04-10
CVE-2021-47186 tipc: check for null after calling kmemdup — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47184 i40e: Fix NULL ptr dereference on VSI filter sync — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47182 scsi: core: Fix scsi_mode_sense() buffer length handling — Linux 7.1AIHighAI2024-04-10
CVE-2021-47183 scsi: lpfc: Fix link down processing to address NULL pointer dereference — Linux 5.5AIMediumAI2024-04-10
CVE-2021-47181 usb: musb: tusb6010: check return value after calling platform_get_resource() — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26816 x86, relocs: Ignore relocations in .notes section — Linux 5.5AIMediumAI2024-04-10
CVE-2024-26815 net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check — Linux 8.1AIHighAI2024-04-10
CVE-2024-26811 ksmbd: validate payload size in ipc response — Linux 7.1 -2024-04-08
CVE-2024-27437 vfio/pci: Disable auto-enable of exclusive INTx IRQ — Linux 7.7 -2024-04-05
CVE-2024-26814 vfio/fsl-mc: Block calling interrupt handler without trigger — Linux 6.2 -2024-04-05
CVE-2024-26812 vfio/pci: Create persistent INTx handler — Linux 7.1 -2024-04-05
CVE-2024-26813 vfio/platform: Create persistent IRQ handlers — Linux 5.5 -2024-04-05
CVE-2024-26810 vfio/pci: Lock external INTx masking ops — Linux 6.3 -2024-04-05
CVE-2024-26809 netfilter: nft_set_pipapo: release elements in clone only from destroy path — Linux 6.3 -2024-04-04
CVE-2024-26808 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain — Linux 5.5 -2024-04-04
CVE-2024-26806 spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks — Linux 7.1 -2024-04-04
CVE-2024-26807 spi: cadence-qspi: fix pointer reference in runtime PM hooks — Linux 7.8 -2024-04-04
CVE-2024-26805 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter — Linux 7.1 -2024-04-04
CVE-2024-26803 net: veth: clear GRO when clearing XDP even when down — Linux 7.8 -2024-04-04
CVE-2024-26804 net: ip_tunnel: prevent perpetual headroom growth — Linux 7.1 -2024-04-04
CVE-2024-26802 stmmac: Clear variable when destroying workqueue — Linux 5.5 -2024-04-04
CVE-2024-26801 Bluetooth: Avoid potential use-after-free in hci_error_reset — Linux 8.1 -2024-04-04
CVE-2024-26800 tls: fix use-after-free on failed backlog decryption — Linux--2024-04-04

This page lists every published CVE security advisory associated with linux. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.