Microsoft has recorded CVE-2026-25179 as a newly disclosed elevation-of-privilege vulnerability in the Windows Ancillary Function Driver for WinSock (AFD.sys), and system owners should treat it as an Important local privilege escalation that requires immediate inventorying and patching across...
Microsoft today confirmed a high‑severity elevation‑of‑privilege flaw in the Windows Ancillary Function Driver for WinSock (AFD.sys) tracked as CVE‑2026‑25176, a kernel‑level improper access control defect that — if left unpatched — allows a locally authorized, low‑privileged user to elevate to...
Microsoft’s security catalog lists CVE-2026-25175 as a newly recorded elevation-of-privilege vulnerability in the Windows NTFS file system: an out-of-bounds read in the NTFS driver that, when triggered by a local, low-privileged account, can be converted into a SYSTEM-level compromise...
Microsoft has published details for CVE-2026-25167, a use‑after‑free elevation‑of‑privilege flaw in the Microsoft Brokering File System (BFS) that can allow a locally‑accessible attacker to escalate to SYSTEM‑level privileges on unpatched machines; Microsoft lists the vulnerability in the March...
Microsoft’s March Patch Tuesday added another Windows kernel elevation-of-privilege entry to the list: CVE-2026-24289, an Important-rated Windows Kernel vulnerability that Microsoft patched as part of the March 10, 2026 security updates. This is one of dozens of elevation-of-privilege (EoP)...
Microsoft’s public tracking entry for CVE‑2026‑24283 identifies a new elevation‑of‑privilege weakness in the Windows Multiple UNC Provider kernel component that Microsoft classifies as a kernel‑mode, local attack path — and the vendor’s published confidence signal must be treated as the...
A logic error in the Android kernel’s mem_protect.c functions can let a local, unprivileged process cause arbitrary code execution in kernel context — giving an attacker a direct elevation to system privileges without any user interaction or extra execution rights. (nvd.nist.gov)
Background /...
A high‑severity memory‑safety flaw in Portwell Engineering Toolkits (version 4.8.2) — tracked as CVE‑2026‑3437 — lets a local, authenticated user read and write arbitrary kernel memory through the product’s driver, creating a realistic path to local privilege escalation and denial‑of‑service on...
Security researchers have publicly released a working proof‑of‑concept (PoC) that reliably forces a Windows host into an unrecoverable Blue Screen of Death (BSoD) by abusing a logic bug in the Common Log File System driver (CLFS.sys), tracked as CVE‑2026‑2636 — a locally‑triggerable...
A subtle misstep in nftables object handling created a classic kernel-level use‑after‑free that has since rippled through distributions and cloud images: an nft object or expression could point to a set in a different nft table, and when that table was removed the remaining dangling reference...
The Linux kernel vulnerability tracked as CVE-2024-39495 is a use-after-free in the greybus subsystem (gb_interface_release) triggered by a race between workqueue execution and object teardown, and Microsoft’s Security Response Center (MSRC) has publicly attested that Azure Linux includes the...
Microsoft’s short advisory line — “Azure Linux includes this open‑source library and is therefore potentially affected by this vulnerability” — is accurate for the product Microsoft has inventory‑checked, but it is a product‑scoped attestation, not proof that no other Microsoft product or...
CVE-2025-38181 is a kernel-level null-pointer dereference in the CALIPSO option handling that was fixed upstream by defensive checks in calipso_req_setattr() and calipso_req_delattr(); Microsoft’s Security Response Center (MSRC) has publicly attested that Azure Linux includes the implicated...
The Linux kernel bug tracked as CVE-2025-38147 — described upstream as “calipso: Don't call calipso functions for AF_INET sk” — is a relatively compact but meaningful vulnerability whose real-world implications hinge less on dramatic remote code execution and more on software supply-chain and...
No — Azure Linux is the only Microsoft product Microsoft has publicly attested to include the specific open‑source component tied to CVE‑2025‑38122, but that attestation is product‑scoped and does not prove that other Microsoft artifacts cannot also include the same vulnerable upstream Linux...
Microsoft’s public advisory that “Azure Linux includes this open‑source library and is therefore potentially affected” is accurate — but it is a product‑scoped attestation, not a claim that Azure Linux is the only Microsoft product that could contain the vulnerable kernel code. erview...
A subtle memory-management mistake in the Intel ISH HID driver has been assigned CVE-2025-21928 and fixed upstream — the bug is a classic use-after-free in ishtp_hid_remove() that can cause random system crashes shortly after the driver is removed and therefore represents a real availability...
A subtle design assumption in the Linux networking stack became a loud wake-up call for kernel maintainers and infrastructure operators in April 2025: CVE‑2025‑21920, tracked as “vlan: enforce underlying device type,” permits VLAN devices to be created on non‑Ethernet interfaces and, in doing...
The Linux kernel vulnerability tracked as CVE‑2024‑58093 — a PCI/ASPM (PCI Express Active State Power Management) bug that can lead to use‑after‑free crashes during certain hot‑unplug sequences — has been publicly fixed upstream and widely patched by Linux distributors. Microsoft’s Security...
A newly disclosed Linux-kernel vulnerability in the Bluetooth L2CAP implementation — tracked as CVE-2025-21969 — is a slab use-after-free in l2cap_send_cmd that can trigger kernel memory corruption and sustained denial-of-service, and it has been fixed upstream by synchronizing the HCI receive...