MSRC Reports
61 subscribers
2.99K links
Microsoft Security Response Center Reports
(Unofficial).

Reports usually come in bursts, because that's just how Microsoft releases them.
Download Telegram
CVE-2025-40040 mm/ksm: fix flag-dropping behavior in ksm_madvise

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40040
CVE-2025-40005 spi: cadence-quadspi: Implement refcount to handle unbind during busy

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40005
CVE-2025-40082 hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40082
CVE-2026-23228 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23228
CVE-2026-23222 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23222
CVE-2026-23216 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23216
CVE-2026-28364 In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28364
CVE-2025-71232 scsi: qla2xxx: Free sp in error path to fix system crash

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71232
CVE-2026-23220 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23220
CVE-2026-23212 bonding: annotate data-races around slave->last_rx

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23212
CVE-2026-22999 net/sched: sch_qfq: do not free existing class in qfq_change_class()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22999
CVE-2026-22991 libceph: make free_choose_arg_map() resilient to partial allocation

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22991
CVE-2026-22990 libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22990
CVE-2026-22984 libceph: prevent potential out-of-bounds reads in handle_auth_done()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22984
CVE-2026-22982 net: mscc: ocelot: Fix crash when adding interface under a lag

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22982
CVE-2026-22980 nfsd: provide locking for v4_end_grace

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22980
CVE-2026-22979 net: fix memory leak in skb_segment_list for GRO packets

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22979
CVE-2025-71162 dmaengine: tegra-adma: Fix use-after-free

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71162
CVE-2025-71150 ksmbd: Fix refcount leak when invalid session is found on session lookup

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71150
CVE-2025-71089 iommu: disable SVA when CONFIG_X86 is set

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71089
CVE-2026-22998 nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22998