Linuxfoundation Security Vulnerabilities (CVEs)

Track 146 security vulnerabilities affecting Linuxfoundation products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

24 Critical
70 High
52 Medium
🔔 Get Alerts for Linuxfoundation
CVE-2026-27969 8.8

This CVE allows attackers with read/write access to Vitess backup storage locations to manipulate backup manifest files and perform path traversal att...

Feb 26, 2026
CVE-2026-27965 9.9

This vulnerability allows attackers with read/write access to Vitess backup storage locations to manipulate backup manifest files, leading to arbitrar...

Feb 26, 2026
CVE-2026-27571 5.9

This vulnerability in NATS-Server allows attackers to cause denial of service via compression bombs in WebSocket messages. It affects deployments usin...

Feb 24, 2026
CVE-2026-27134 8.1

This vulnerability allows unauthorized authentication in Strimzi Kafka clusters when using custom CA certificates with multi-stage chains. Attackers w...

Feb 21, 2026
CVE-2026-27133 5.9

This vulnerability in Strimzi allows Kafka Connect or Kafka MirrorMaker 2 operands to incorrectly trust all certificates in a CA chain when connecting...

Feb 20, 2026
CVE-2026-25996 9.8

This vulnerability in Inspektor Gadget allows malicious containers to inject ANSI escape sequences into terminal output, potentially enabling terminal...

Feb 12, 2026
CVE-2026-25804 9.1

This vulnerability in Antrea's network policy priority assignment system causes incorrect traffic enforcement due to a uint16 arithmetic overflow when...

Feb 6, 2026
CVE-2026-24051 7.0

OpenTelemetry-Go SDK versions v1.20.0 through v1.39.0 on macOS/Darwin systems are vulnerable to path hijacking attacks. An attacker with local access ...

Feb 2, 2026
CVE-2026-25152 5.3

A path traversal vulnerability in Backstage's TechDocs local generator allows attackers to read arbitrary files from the host filesystem when processi...

Jan 30, 2026
CVE-2026-25153 7.7

This vulnerability allows attackers to execute arbitrary Python code on TechDocs build servers when configured with 'runIn: local'. Malicious actors w...

Jan 30, 2026
CVE-2026-24905 7.8

CVE-2026-24905 is a command injection vulnerability in Inspektor Gadget's image building functionality. An attacker who can control the YAML gadget ma...

Jan 29, 2026
CVE-2026-24835 7.1

A critical authentication bypass vulnerability in Podman Desktop allows any installed extension to completely circumvent permission checks and gain un...

Jan 28, 2026
CVE-2026-24747 8.8

A vulnerability in PyTorch's `weights_only` unpickler allows attackers to craft malicious checkpoint files (.pth) that, when loaded, can corrupt memor...

Jan 27, 2026
CVE-2026-24124 9.8

Dragonfly versions 2.4.1-rc.0 and below have missing authentication and authorization checks on Job API endpoints, allowing unauthenticated users with...

Jan 22, 2026
CVE-2026-24117 5.3

CVE-2026-24117 is a Server-Side Request Forgery (SSRF) vulnerability in Rekor's /api/v1/index/retrieve endpoint that allows attackers to trigger GET r...

Jan 22, 2026
CVE-2026-23831 5.3

This CVE describes a nil pointer dereference vulnerability in Rekor's entry implementation that can cause a panic when processing attacker-controlled ...

Jan 22, 2026
CVE-2026-23955 4.2

This vulnerability in EVerest EV charging software allows malicious operators to read unintended memory regions (heap/stack) through pointer arithmeti...

Jan 21, 2026
CVE-2025-68138 4.7

This vulnerability in EVerest libocpp causes memory leaks through unfreed strdup pointers during connection attempts. It affects EV charging systems u...

Jan 21, 2026
CVE-2025-68139 4.3

This vulnerability in EVerest EV charging software allows attackers to exploit other weaknesses by keeping connections alive despite errors. All EVere...

Jan 21, 2026
CVE-2025-68140 4.3

This vulnerability allows attackers to bypass session validation in EVerest EV charging software by sending V2G messages with session ID 0 when no ses...

Jan 21, 2026
CVE-2025-68141 7.4

A null pointer dereference vulnerability in EVerest EV charging software allows remote attackers to cause denial of service by sending specially craft...

Jan 21, 2026
CVE-2025-68136 7.4

This vulnerability in EVerest EV charging software allows attackers to cause denial of service through null pointer dereference when handling SDP requ...

Jan 21, 2026
CVE-2025-68137 8.3

An integer overflow vulnerability in EVerest EV charging software allows attackers to trigger either infinite loops or stack buffer overflows by sendi...

Jan 21, 2026
CVE-2025-68132 4.6

This vulnerability in EVerest EV charging software allows attackers to crash the process by sending malformed SLIP frames via serial input. It affects...

Jan 21, 2026
CVE-2025-68134 7.4

This vulnerability in EVerest EV charging software allows attackers to cause denial of service by triggering assertion failures that crash individual ...

Jan 21, 2026
CVE-2025-68135 6.5

This vulnerability in EVerest EV charging software allows unhandled C++ exceptions in the TbdController loop to cause silent termination of the contro...

Jan 21, 2026
CVE-2025-68133 7.4

This vulnerability in EVerest EV charging software allows attackers to cause denial of service by exhausting system memory through unlimited TCP conne...

Jan 21, 2026
CVE-2026-22772 5.8

CVE-2026-22772 is a server-side request forgery (SSRF) vulnerability in Fulcio's MetaIssuer URL validation. Attackers can bypass validation using unan...

Jan 12, 2026
CVE-2025-61916 7.9

Spinnaker versions prior to 2025.1.6, 2025.2.3, and 2025.3.0 are vulnerable to server-side request forgery (SSRF) that allows attackers to fetch data ...

Jan 5, 2026
CVE-2025-65566 7.5

A denial-of-service vulnerability in the omec-project UPF's pfcpiface component allows attackers to crash the UPF process by sending malformed PFCP Se...

Dec 18, 2025
CVE-2025-66623 7.4

This vulnerability in Strimzi Kafka Operator versions 0.47.0 through 0.49.0 creates an overly permissive Kubernetes Role that grants Kafka Connect and...

Dec 5, 2025
CVE-2025-64329 5.5

This CVE describes a memory exhaustion vulnerability in containerd's CRI Attach implementation where goroutine leaks allow users to consume host memor...

Nov 7, 2025
CVE-2025-52881 7.5

This CVE-2025-52881 vulnerability in runc allows attackers to redirect writes to /proc filesystem to other locations through race conditions with shar...

Nov 6, 2025
CVE-2025-52565 7.5

A vulnerability in runc allows attackers to bypass container isolation by tricking the system into bind-mounting sensitive read-only or masked paths t...

Nov 6, 2025
CVE-2025-31133 7.8

This vulnerability in runc allows attackers to bypass container isolation by exploiting insufficient verification of bind-mount sources when using /de...

Nov 6, 2025
CVE-2024-25621 7.3

Containerd versions before 1.7.29, 2.0.7, 2.1.5, and 2.2.0 create critical directories with overly permissive access controls, allowing group/world re...

Nov 6, 2025
CVE-2025-20747 6.7

This vulnerability in the GNSS service allows an out-of-bounds write due to incorrect bounds checking. It enables local privilege escalation if an att...

Nov 4, 2025
CVE-2025-20746 6.7

This vulnerability in the GNSS service allows an attacker with System privilege to perform an out-of-bounds write, potentially leading to local privil...

Nov 4, 2025
CVE-2025-20730 6.7

This vulnerability allows local privilege escalation on MediaTek devices due to an insecure default value in the preloader component. An attacker with...

Nov 4, 2025
CVE-2025-55552 7.5

CVE-2025-55552 is an integer overflow vulnerability in PyTorch v2.8.0 that occurs when torch.rot90 and torch.randn_like functions are used together, p...

Sep 25, 2025
CVE-2025-55554 5.3

PyTorch v2.8.0 contains an integer overflow vulnerability in torch.nan_to_num-.long() that could allow memory corruption or denial of service. This af...

Sep 25, 2025
CVE-2025-55557 7.5

A vulnerability in PyTorch v2.7.0 causes a Name Error when models containing torch.cummin operations are compiled with Inductor, leading to Denial of ...

Sep 25, 2025
CVE-2025-46149 5.3

This CVE describes an assertion error vulnerability in PyTorch's nn.Fold module when using the inductor compiler. The vulnerability can cause denial o...

Sep 25, 2025
CVE-2025-46150 5.3

This CVE describes a vulnerability in PyTorch's torch.compile feature where FractionalMaxPool2d produces inconsistent results. This could lead to inco...

Sep 25, 2025
CVE-2025-46152 5.3

A vulnerability in PyTorch's bitwise_right_shift function produces incorrect output when given out-of-bounds values for the 'other' argument. This cou...

Sep 25, 2025
CVE-2025-46153 5.3

This vulnerability in PyTorch versions before 3.7.0 affects the bernoulli_p decompose function, causing inconsistency with CPU implementations that ne...

Sep 25, 2025
CVE-2025-55551 7.5

A vulnerability in PyTorch's torch.linalg.lu component allows attackers to trigger a Denial of Service (DoS) through specific slice operations. This a...

Sep 25, 2025
CVE-2025-59354 5.3

Dragonfly versions before 2.1.0 use MD5 hashing for file verification, which is cryptographically broken and allows attackers to create malicious file...

Sep 17, 2025
CVE-2025-59348 7.5

A denial-of-service vulnerability in Dragonfly's P2P file distribution system allows attackers to bypass rate limiting by exploiting an uninitialized ...

Sep 17, 2025
CVE-2025-59350 5.3

Dragonfly's proxy access control mechanism prior to version 2.1.0 uses simple string comparisons vulnerable to timing attacks. Attackers can guess pas...

Sep 17, 2025

Why Monitor Linuxfoundation Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 146+ known vulnerabilities affecting Linuxfoundation products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Linuxfoundation packages in under 60 seconds. No agents required - completely agentless scanning that works across Linuxfoundation deployments.

Free vulnerability database: Access detailed information about every Linuxfoundation CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Linuxfoundation CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Linuxfoundation CVEs Free