Linux Foundation
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Linux Foundation product.
RSS Feeds for Linux Foundation security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Linux Foundation products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Linux Foundation Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2025 there have been 48 vulnerabilities in Linux Foundation with an average score of 6.6 out of ten. Last year, in 2024 Linux Foundation had 60 security vulnerabilities published. Right now, Linux Foundation is on track to have less security vulnerabilities in 2025 than it did last year. Last year, the average CVE base score was greater by 0.50
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 48 | 6.62 |
| 2024 | 60 | 7.12 |
| 2023 | 90 | 6.70 |
| 2022 | 51 | 7.22 |
| 2021 | 38 | 7.14 |
| 2020 | 41 | 7.14 |
| 2019 | 11 | 6.98 |
| 2018 | 2 | 6.55 |
It may take a day or so for new Linux Foundation vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Linux Foundation Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-20696 | Aug 04, 2025 |
Android Device Admin API OOB Write LPE via Physical AccessIn DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801. |
|
| CVE-2025-20693 | Jul 08, 2025 |
Out-of-Bounds Read in Alps WLAN STA Driver Causing Info DisclosureIn wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421. |
|
| CVE-2025-5150 | May 25, 2025 |
docarray 0.40.1 Web API prototype pollution via __getitem__A vulnerability was found in docarray up to 0.40.1. It has been rated as critical. Affected by this issue is the function __getitem__ of the file /docarray/data/torch_dataset.py of the component Web API. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-32434 | Apr 18, 2025 |
PyTorch RCE via torch.load weights_only=True <2.6.0PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0. |
|
| CVE-2025-3730 | Apr 16, 2025 |
PyTorch 2.6.0 ctc_loss Local DoS VulnerabilityA vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue. The security policy of the project warns to use unknown models which might establish malicious effects. |
|
| CVE-2025-20656 | Apr 07, 2025 |
CVE-2025-20656: OOB Write in DA Enables Physical Local Priv Esc EscalationIn DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033. |
|
| CVE-2025-3136 | Apr 03, 2025 |
PyTorch 2.6.0 Mem Corruption via caching_allocator_deleteA vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0. This issue affects the function torch.cuda.memory.caching_allocator_delete of the file c10/cuda/CUDACachingAllocator.cpp. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-3121 | Apr 02, 2025 |
Memory Corruption via torch.jit.jit_module_from_flatbuffer (PyTorch 2.6.0)A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-3001 | Mar 31, 2025 |
PyTorch 2.6.0 torch.lstm_cell Local MemCorruptA vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-2999 | Mar 31, 2025 |
PyTorch 2.6.0 Critical Memory Corruption in torch.nn.utils.rnn.unpack_sequenceA vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-3000 | Mar 31, 2025 |
PyTorch 2.6.0 Critical JIT Script Mem. CorruptionA vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-2998 | Mar 31, 2025 |
PyTorch 2.6.0 pad_packed_sequence Memory Corruption CVE-2025-2998A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. |
|
| CVE-2025-2953 | Mar 30, 2025 |
PyTorch 2.6.0 (+cu124) torch.mkldnn_max_pool2d DoSA vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects. |
|
| CVE-2024-53351 | Mar 21, 2025 |
Pipecd v0.49 Insecure Permissions Expose Service Account TokenInsecure permissions in pipecd v0.49 allow attackers to gain access to the service account's token, leading to escalation of privileges. |
|
| CVE-2024-53349 | Mar 21, 2025 |
Kuadrant 0.11.3 Insecure Permissions Leak SA TokenInsecure permissions in kuadrant v0.11.3 allow attackers to gain access to the service account's token, leading to escalation of privileges via the secretes component in the k8s cluster |
|
| CVE-2025-20651 | Mar 03, 2025 |
Local Info Disclosure via OOB Read in 'da' ComponentIn da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062. |
|
| CVE-2025-20650 | Mar 03, 2025 |
Local Priv Esc via OOB Write in ALPS Driver (CVE-2025-20650)In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061. |
|
| CVE-2025-20635 | Feb 03, 2025 |
V6 DA OOB Write: Local Priv Escalation via Physical AccessIn V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434. |
|
| CVE-2024-20147 | Feb 03, 2025 |
MediaTek BT FW reachable assertion leads to remote DoSIn Bluetooth FW, there is a possible reachable assertion due to improper exception handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389046 (Note: For MT79XX chipsets) / ALPS09136501 (Note: For MT2737, MT3603, MT6XXX, and MT8XXX chipsets); Issue ID: MSV-1797. |
|
| CVE-2023-37038 | Jan 21, 2025 |
Null pointer deref in Magma MME (<=1.8.0) via S1AP Uplink NASA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `MME_UE_S1AP_ID` field. |
|
| CVE-2024-24423 | Jan 21, 2025 |
Magma <=1.8 Buffer Overflow in decode_esm_message_container (DoS) (fixed 1.9)The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_esm_message_container function at /nas/ies/EsmMessageContainer.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24422 | Jan 21, 2025 |
Magma <=1.8.0 stack overflow in decode_protocol_configuration_options allows DoSThe Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a stack overflow in the decode_protocol_configuration_options function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24419 | Jan 21, 2025 |
Magma <=1.8.0 Buffer Overflow in DTFTPP (DoS via crafted NAS packet)The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_traffic_flow_template_packet_filter function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24418 | Jan 21, 2025 |
DoS via bufover in Magma <=1.8.0 PdnAddress.cppThe Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_pdn_address function at /nas/ies/PdnAddress.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24417 | Jan 21, 2025 |
Magma <=1.8.0 Buf ovfl in decode_proto_config_opts Causing NAS DoSThe Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_protocol_configuration_options function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24416 | Jan 21, 2025 |
Magma 1.8 Buffer Overflow in decode_access_point_name_ie (DoS)The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_access_point_name_ie function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2023-37037 | Jan 21, 2025 |
Null ptr deref in Magma MME <=1.8 via S1Setup RequestA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `S1Setup Request` packet missing an expected `Supported TAs` field. |
|
| CVE-2023-37036 | Jan 21, 2025 |
NPE in Magma MME <=1.8 via missing ENB_UE_S1AP_ID in S1AP UplinkA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `ENB_UE_S1AP_ID` field. |
|
| CVE-2023-37034 | Jan 21, 2025 |
Magma MME Null Pointer Deref via S1AP missing TAI (1.8)A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `TAI` field. |
|
| CVE-2023-37033 | Jan 21, 2025 |
Magma MME Null Pointer Deref. before 1.9 via S1AP Initial UEA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `EUTRAN_CGI` field. |
|
| CVE-2023-37032 | Jan 21, 2025 |
Magma MME Stack Buffer Overflow <1.8 via Oversized Emergency ListA Stack-based buffer overflow in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an oversized `Emergency Number List` Information Element. |
|
| CVE-2023-37031 | Jan 21, 2025 |
Magma MME Null-Pointer via S1AP eNB Config Transfer (1.8.0)A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `eNB Configuration Transfer` packet missing its required `Target eNB ID` field. |
|
| CVE-2023-37030 | Jan 21, 2025 |
Magma MME Null Ptr Dref <1.8 Crash via S1AP Init UE MsgA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `eNB_UE_S1AP_ID` field. |
|
| CVE-2023-37029 | Jan 21, 2025 |
Magma <=1.8.0 Assert Crash in MME via Oversized NAS Packet (DoS)Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) are susceptible to an assertion-based crash when an oversized NAS packet is received. An attacker may leverage this behavior to repeatedly crash the MME via either a compromised base station or via an unauthenticated cellphone within range of a base station managed by the MME, causing a denial of service. |
|
| CVE-2023-37028 | Jan 21, 2025 |
Null Ptr Deref in Magma MME (<=1.8.0) via S1AP E-RAB Mod Ind packetA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `E-RAB Modification Indication` packet missing an expected `eNB_UE_S1AP_ID` field. |
|
| CVE-2023-37027 | Jan 21, 2025 |
Null Pointer Deref in Magma MME <1.8.0 via S1AP E-RAB Modification IndicationNull pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `E-RAB Modification Indication` packet missing an expected `eNB_UE_S1AP_ID` field. |
|
| CVE-2023-37026 | Jan 21, 2025 |
Null ptr deref in Magma MME <=1.8 via S1AP E-RAB ResponseA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `E-RAB Release Response` packet missing an expected `MME_UE_S1AP_ID` field. |
|
| CVE-2023-37025 | Jan 21, 2025 |
Null Ptr Deref in Magma MME <=1.8 via missing S1AP ResetTypeA Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Reset` packet missing an expected `ResetType` field. |
|
| CVE-2023-37024 | Jan 21, 2025 |
MME Assertion Crash in Magma <=1.8.0 via NAS EN IEA reachable assertion in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an `Emergency Number List` Information Element. |
|
| CVE-2024-24420 | Jan 21, 2025 |
DoS via crafted NAS packet in Magma <=1.8.0 decode_linked_ti_ieA reachable assertion in the decode_linked_ti_ie function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-24421 | Jan 21, 2025 |
Magma <=1.8.0 Type Confusion in nas_message_decode arbitrary code execA type confusion in the nas_message_decode function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted NAS packet. |
|
| CVE-2024-20143 | Jan 06, 2025 |
V6 DA Driver OOB Write Enables Local Priv EscalationIn V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069. |
|
| CVE-2024-20140 | Jan 06, 2025 |
Microsoft Windows PowerShell OOB Write EscalationIn power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09270402; Issue ID: MSV-2020. |
|
| CVE-2024-20152 | Jan 06, 2025 |
Microsoft WLAN Driver Assertion Failure DoS via Improper Exception HandlingIn wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798. |
|
| CVE-2024-20145 | Jan 06, 2025 |
V6 DA OOB Write Enables Local Priv EscalationIn V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09290940; Issue ID: MSV-2040. |
|
| CVE-2024-20146 | Jan 06, 2025 |
WCNCR WLAN STA Driver OOB Write Remote Code ExecIn wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389496 / ALPS09137491; Issue ID: MSV-1835. |
|
| CVE-2024-20144 | Jan 06, 2025 |
ALPS V6 DA OOB Write for Local Priv EscalationIn V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2041. |
|
| CVE-2024-20148 | Jan 06, 2025 |
OOB write in WLAN STA firmware remote code execution (CVE202420148)In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796. |
|
| CVE-2022-31670 | Nov 14, 2024 |
Harbor Tag Retention Policy Access Control VulnerabilityHarbor fails to validate the user permissions when updating tag retention policies. By sending a request to update a tag retention policy with an id that belongs to a project that the currently authenticated user doesnt have access to, the attacker could modify tag retention policies configured in other projects. |
|
| CVE-2022-31668 | Nov 14, 2024 |
Harbor P2P Preheat Policy Update Permission Bypass VulnerabilityHarbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects. |
|