CVE-2025-69646 Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis.
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69646
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69646
CVE-2026-3731 libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3731
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3731
CVE-2026-26018 CoreDNS Loop Detection Denial of Service Vulnerability
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26018
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26018
CVE-2026-26017 CoreDNS ACL Bypass
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26017
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26017
CVE-2026-26148 Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability
Acknowledgement Updated
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26148
Acknowledgement Updated
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26148
Chromium: CVE-2026-3537 Object lifecycle issue in PowerVR
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3537
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2021) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3537
CVE-2026-3784 wrong proxy connection reuse with credentials
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3784
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3784
CVE-2026-1965 bad reuse of HTTP Negotiate connection
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1965
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1965
CVE-2026-23240 tls: Fix race condition in tls_sw_cancel_work_tx()
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23240
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23240
CVE-2026-23239 espintcp: Fix race condition in espintcp_close()
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23239
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23239
CVE-2026-3783 token leak with redirect and netrc
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3783
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3783
CVE-2026-23868
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23868
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23868
CVE-2026-25679 Incorrect parsing of IPv6 host literals in net/url
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25679
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25679
CVE-2025-61724 Excessive CPU consumption in Reader.ReadResponse in net/textproto
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61724
CVE-2025-58186 Lack of limit when parsing cookies can cause memory exhaustion in net/http
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58186
CVE-2025-61725 Excessive CPU consumption in ParseAddress in net/mail
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61725
CVE-2025-58183 Unbounded allocation when parsing GNU sparse map in archive/tar
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58183
CVE-2025-58188 Panic when validating certificates with DSA public keys in crypto/x509
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58188
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58188
CVE-2025-61727 Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61727
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61727
CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61729
Information published.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61729
CVE-2026-26133 M365 Copilot Information Disclosure Vulnerability
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26133
Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26133