Skip to main content
Mallory

Microsoft discloses Chromium, pyOpenSSL, Linux kernel and DNS handling flaws

open-source-dependency-vulnerabilityendpoint-software-vulnerabilitywidely-deployed-product-advisory
Updated March 31, 2026 at 02:01 AM26 sources
Share:
Microsoft discloses Chromium, pyOpenSSL, Linux kernel and DNS handling flaws

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Microsoft published a new set of security advisories covering multiple third-party and open-source components, led by several Chromium vulnerabilities affecting WebGL, WebRTC, ANGLE, V8, PDFium, the Digital Credentials API, and Extensions. The issues include out-of-bounds read and write, heap buffer overflow, integer overflow, and use-after-free conditions tracked as CVE-2026-4440, CVE-2026-4463, CVE-2026-4464, CVE-2026-4447, CVE-2026-4446, CVE-2026-4456, CVE-2026-4452, CVE-2026-4455, CVE-2026-4450, and CVE-2026-4458. Microsoft also listed CVE-2026-4437, a flaw in gethostbyaddr and gethostbyaddr_r that may incorrectly handle DNS responses.

The advisory set also includes pyOpenSSL flaws CVE-2026-27459, a DTLS cookie callback buffer overflow, and CVE-2026-27448, which could allow TLS connection bypass through an unhandled exception in set_tlsext_servername_callback. Additional entries cover several Linux kernel issues, including a potential NULL pointer dereference in RDMA/siw (CVE-2026-23242), a refcount bug and potential use-after-free in perf_mmap (CVE-2026-23248), an infinite loop in ntfs3 metadata handling (CVE-2025-71265), an io_uring memory-management flaw (CVE-2026-23259), and a divide error in rivafb (CVE-2026-23266), alongside audit subsystem updates tracked as CVE-2025-71239 and CVE-2026-23241.

Timeline

  1. Mar 27, 2026

    Microsoft publishes advisory for Chromium WebGPU use-after-free flaw

    Microsoft's Security Update Guide published an advisory for CVE-2026-4678, a Chromium use-after-free vulnerability in WebGPU. The entry adds another Chromium vulnerability to Microsoft's March 2026 disclosure set.

  2. Mar 26, 2026

    Microsoft publishes advisory for wifi/libertas use-after-free vulnerability

    Microsoft's Security Update Guide published an advisory for CVE-2026-23281 affecting the Linux kernel wifi/libertas subsystem, described as a fix for a use-after-free in lbs_free_adapter(). The entry adds another open-source component vulnerability to Microsoft's March 2026 disclosures.

  3. Mar 26, 2026

    Microsoft publishes advisory for SCSI core refcount leak vulnerability

    Microsoft's Security Update Guide published an advisory for CVE-2026-23296 affecting the Linux kernel SCSI core, described as a fix for a refcount leak in tagset_refcnt handling. The entry adds another open-source component vulnerability to Microsoft's March 2026 disclosures.

  4. Mar 26, 2026

    Microsoft publishes advisory for netfilter nft_set_pipapo vulnerability

    Microsoft's Security Update Guide published an advisory for CVE-2026-23351 affecting Linux netfilter, specifically nft_set_pipapo garbage-collection handling. The entry added another open-source component vulnerability to Microsoft's March 2026 disclosures.

  5. Mar 23, 2026

    Microsoft publishes batch of Chromium vulnerability advisories

    Microsoft's Security Update Guide published multiple Chromium CVE entries covering WebGL, WebRTC, ANGLE, V8, PDFium, Extensions, and the Digital Credentials API. The batch included out-of-bounds read/write, heap buffer overflow, integer overflow, and use-after-free issues.

  6. Mar 22, 2026

    Microsoft publishes advisory for gethostbyaddr DNS handling flaw

    Microsoft published a Security Update Guide entry for CVE-2026-4437, describing incorrect handling of DNS responses by gethostbyaddr and gethostbyaddr_r. The advisory added another non-Chromium vulnerability to the March disclosures.

  7. Mar 20, 2026

    Microsoft publishes advisory for io_uring and rivafb vulnerabilities

    Additional Security Update Guide entries were published for Linux kernel flaws in io_uring/rw and fbdev:rivafb, describing memory handling and divide error issues. This expanded the set of disclosed open-source component vulnerabilities tracked by Microsoft.

  8. Mar 18, 2026

    Microsoft publishes advisories for Linux kernel and pyOpenSSL CVEs

    Microsoft's Security Update Guide published multiple vulnerability entries affecting Linux kernel components and pyOpenSSL, including issues in audit, ntfs3, RDMA/siw, perf/core, and TLS/DTLS handling. These advisories document the vulnerabilities and associated fixes or affected components.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Microsoft discloses multiple Linux kernel flaws affecting filesystems, networking, and drivers

Microsoft discloses multiple Linux kernel flaws affecting filesystems, networking, and drivers

Microsoft published a batch of Security Update Guide entries for Linux kernel vulnerabilities spanning core subsystems including `ext4`, `xfs`, memory management, networking, virtualization, and device drivers. The listed issues include memory-safety and stability flaws such as a use-after-free in `ext4` tracked as **CVE-2026-31446**, an `smc` double-free in **CVE-2026-31507**, a teardown-order use-after-free in the `spi-fsl-lpspi` driver in **CVE-2026-31485**, and a Bluetooth `L2CAP` bug in **CVE-2026-31498** that could trigger an infinite loop. Additional entries cover fixes in `af_key`, `netfilter` `ctnetlink`, `nfc` `nci`, `perf`, and memory-management code paths. The disclosures also include filesystem and virtual networking fixes such as **CVE-2026-31452** in `ext4`, **CVE-2026-31454** in `xfs`, and two `openvswitch` issues, **CVE-2026-31678** and **CVE-2026-31679`, addressing tunnel device release handling and MPLS payload-length validation. Microsoft further listed **CVE-2026-31601** in `vfio/xe` and **CVE-2026-31589** in the kernel MM subsystem, indicating broad exposure across Linux environments that rely on affected kernel components. The set of advisories points to patch activity focused on preventing use-after-free, double-free, locking, validation, and resource-lifecycle errors in widely deployed kernel code.

5 days ago
Microsoft Flags Multiple Chromium Memory-Safety Flaws in Security Update Guide

Microsoft Flags Multiple Chromium Memory-Safety Flaws in Security Update Guide

Microsoft published Security Update Guide entries for a broad set of **Chromium** vulnerabilities affecting browser components including **WebRTC, ANGLE, Network, Navigation, Blink, Base, V8, Skia,** and **WebAudio**. The listed issues include multiple `use-after-free` bugs such as `CVE-2026-4445`, `CVE-2026-4454`, `CVE-2026-4449`, and `CVE-2026-4441`, as well as a `heap buffer overflow` in `ANGLE` (`CVE-2026-4448`), a `heap buffer overflow` in `WebAudio` (`CVE-2026-4443`), an `out-of-bounds read` in `Skia` (`CVE-2026-4460`), `insufficient validation of untrusted input` in `Navigation` (`CVE-2026-4451`), and an `inappropriate implementation` flaw in `V8` (`CVE-2026-4461`). The same set of advisories also included non-Chromium entries tied to lower-level platform components: `CVE-2026-4438` for `gethostbyaddr` and `gethostbyaddr_r` returning invalid DNS hostnames, `CVE-2025-71267` for an `ntfs3` infinite loop triggered by a zero-sized `ATTR_LIST`, and `CVE-2026-23233` for an `f2fs` fix to avoid mapping the wrong physical block for a swapfile. Together, the disclosures show Microsoft tracking both browser-engine memory-corruption risks and underlying filesystem and networking defects through its update pipeline.

1 months ago
Microsoft Discloses Broad Set of Linux Kernel Vulnerabilities

Microsoft Discloses Broad Set of Linux Kernel Vulnerabilities

Microsoft published a broad batch of Security Update Guide entries for Linux kernel flaws affecting memory management, networking, virtualization, device drivers, and subsystem input validation. The listed issues include use-after-free, NULL dereference, integer underflow, refcount underflow, information disclosure, and bounds-checking failures tracked as **`CVE-2026-31496`**, **`CVE-2026-31458`**, **`CVE-2026-31689`**, **`CVE-2026-31615`**, **`CVE-2026-31664`**, **`CVE-2026-31656`**, **`CVE-2026-31611`**, **`CVE-2026-31671`**, **`CVE-2026-31612`**, and others. Affected components span `nf_conntrack_expect`, `damon`, `edac_mc`, `renesas_usb3`, `xfrm`, `drm/i915`, `ksmbd`, `stmmac`, `tipc`, `mptcp`, `NFC`, `HID`, `KVM`, `mmc`, `x86/CPU`, `PCI endpoint`, `blk-cgroup`, `media/as102`, and `altera-tse`. Several entries point to bugs that could lead to kernel crashes, memory corruption, or data leakage if triggered through malformed input, protocol handling, or device interaction. Notable examples include a slab use-after-free in `mptcp`, information leaks in `xfrm_user` and `xfrm`, validation flaws in `ksmbd`, endpoint index handling in `usb: gadget: renesas_usb3`, and multiple underflow and teardown-ordering bugs across networking and driver code. The disclosures indicate a coordinated publication of upstream Linux kernel fixes through Microsoft's advisory channel, underscoring the need for organizations running Linux workloads in Microsoft-connected environments to review affected kernel versions and apply vendor patches promptly.

3 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Microsoft discloses Chromium, pyOpenSSL, Linux kernel and DNS handling flaws | Mallory