The page for CVE-2026-23191 is currently unavailable on Microsoft’s update guide, but the underlying Linux kernel issue is identifiable: ALSA: aloop: Fix racy access at PCM trigger. The upstream stable patch says the PCM trigger callback in the aloop driver was checking PCM state and stopping...
CVE-2026-23221 is another reminder that small-looking kernel bugs can have large security consequences: Microsoft’s update guide entry appears to have been removed or is temporarily unavailable, but the vulnerability title itself points to a use-after-free in the Linux fsl-mc bus code...
The Linux kernel’s perf subsystem has a new security-flavored bug fix on the table: CVE-2026-23248, described as a refcount bug and potential use-after-free in perf_mmap. The Microsoft Security Response Center entry currently returns a not-found page, but the title itself is enough to tell a...
Microsoft has recorded CVE-2026-26132 as a Windows Kernel use‑after‑free vulnerability that can be triggered by an authorized local user to gain elevated privileges, and administrators should treat it as a high‑priority remediation item in this month’s Patch Tuesday release. (msrc.microsoft.com)...
Microsoft has recorded CVE-2026-25171 as a local elevation-of-privilege (EoP) bug in Windows Authentication Methods — a use‑after‑free in authentication code that, if triggered by an already authorized local actor, can elevate privileges on an affected host; Microsoft’s advisory entry and...
Microsoft has published details for CVE-2026-25167, a use‑after‑free elevation‑of‑privilege flaw in the Microsoft Brokering File System (BFS) that can allow a locally‑accessible attacker to escalate to SYSTEM‑level privileges on unpatched machines; Microsoft lists the vulnerability in the March...
The Linux kernel's netfilter subsystem has a new, high-consequence memory-corruption fix that any Linux systems team running nftables must treat as urgent: CVE-2026-23231 patches a race-triggered use-after-free in nf_tables_addchain() that can leave published chain objects accessible to active...
The Linux kernel received a targeted fix for a subtle but potentially disruptive race condition in the NFS daemon (nfsd) that could lead to memory being accessed after it was freed. Tracked as CVE-2026-22980, the issue centers on handling of the NFSv4 grace period end — specifically the...
A subtle misstep in nftables object handling created a classic kernel-level use‑after‑free that has since rippled through distributions and cloud images: an nft object or expression could point to a set in a different nft table, and when that table was removed the remaining dangling reference...
A subtle race in the Linux kernel’s Unix-domain socket garbage collector can let the kernel free socket buffers (skbs) while another path still holds a pointer to them, producing a classic use‑after‑free (UAF) that can crash or destabilize systems and — in theory — open the door to more serious...
A recently disclosed Linux-kernel vulnerability, tracked as CVE-2023-51042, exposes a fence-related use‑after‑free in the AMD GPU driver (amdgpu) that was fixed upstream in the 6.4.12 stable release; the bug can crash affected kernels or otherwise deny availability to systems that accept...
A subtle timing bug deep in the Linux writeback code — a use‑after‑free in wb_inode_writeback_end() — can let an attacker trigger a kernel panic or sustained denial‑of‑service by removing a disk while writeback bookkeeping is still racing to schedule bandwidth‑estimation work; the flaw is...
The Linux kernel fix for CVE-2025-38211 closes a subtle but dangerous lifetime-management bug in the RDMA iWCM (InfiniBand/RDMA Connection Management) stack: work objects allocated per cm_id could be used after they were freed, causing kernel memory corruption and deterministic crashes that...
A subtle race in the Linux wireless stack — tracked as CVE-2025-21979 — can let a queued wiphy work item run after its owning wiphy object has already been freed, producing a classic use-after-free that reliably threatens system availability and, in worst cases, integrity; the Linux kernel...
A subtle memory-management mistake in the Intel ISH HID driver has been assigned CVE-2025-21928 and fixed upstream — the bug is a classic use-after-free in ishtp_hid_remove() that can cause random system crashes shortly after the driver is removed and therefore represents a real availability...
A subtle sequence of PHP internals — an exception triggered inside a magic property setter combined with a null‑coalescing assignment — can produce a use‑after‑free in the engine’s shutdown path, leaving unpatched PHP 8.3 and 8.4 builds exposed to high‑impact crashes and, in some scenarios, the...
A critical race-condition bug in the Linux kernel’s MD (Multiple Devices) subsystem — tracked as CVE-2025-22126 — was fixed upstream after researchers identified a use‑after‑free (UAF) that can occur when the kernel iterates the global list of md devices. The fix addresses a subtle iterator /...
A newly disclosed Linux-kernel vulnerability, tracked as CVE‑2025‑21999, patches a use‑after‑free (UAF) race in the proc filesystem: a race between module removal (rmmod) and inode creation in proc_get_inode() could let the kernel dereference a freed module pointer and crash or corrupt kernel...
The RapidIO networking patch recorded as CVE-2025-21934 fixes a small but consequential memory-management mistake in the Linux kernel that, under certain failure conditions, could leave a RapidIO port structure pointing at freed memory — a classic use-after-free that translates into a...
The Linux kernel fix for CVE-2024-44986 addresses a real, low-level IPv6 use‑after‑free (UAF) condition in ip6_finish_output2(), but Microsoft’s MSRC wording about Azure Linux being “the product that includes the open‑source library and is therefore potentially affected” is a product‑scoped...