Linuxfoundation Vulnerabilities
Comprehensive security vulnerability database for Linuxfoundation products
3
1
1
1
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-61611 | 7.5 | This vulnerability allows an attacker to remotely crash the modem, causing a denial of service without needing any special permissions. It occurs due to improper checks on the input data sent to the modem. | linuxfoundationyocto | Theoretical | 29 days agoMar 9, 2026 |
| CVE-2026-29186 | 9.8 | This vulnerability allows an attacker to run any Python code on a server using the Backstage platform, potentially taking full control of the system. It occurs when the attacker can create a specially crafted configuration file for documentation that bypasses security checks, and it has been fixed in the latest version. | linuxfoundationbackstage plugin-techdocs-node | Theoretical | about 1 month agoMar 7, 2026 |
| CVE-2026-20435 | 4.6 | This vulnerability allows an attacker with physical access to a device to read unique identifiers that could reveal sensitive information about the device. No special permissions or user actions are needed to exploit this flaw, making it a significant risk for devices that may be left unattended. | linuxfoundationyocto | Exploit Available | about 1 month agoMar 2, 2026 |
About Linuxfoundation Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Linuxfoundation products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.