A system error at Bithumb sent 620,000 Bitcoin worth about $40B to hundreds of users during a promotion, briefly disrupting prices and drawing scrutiny.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.112/6.12.53/6.17.3. The impacted element is the function nft_objref. The manipulation leads to state issue.
This vulnerability is listed as CVE-2025-40206. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.53/6.17.3 and classified as critical. Affected by this vulnerability is the function path_put. Executing a manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2025-40203. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.3. It has been classified as problematic. Affected by this issue is some unknown functionality of the component sctp. The manipulation leads to incorrect comparison.
This vulnerability is uniquely identified as CVE-2025-40204. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Linux Kernel up to 6.17.3. This affects the function btrfs_encode_fh of the component btrfs. Such manipulation leads to out-of-bounds write.
This vulnerability is documented as CVE-2025-40205. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.156/6.6.112/6.12.53/6.17.3. It has been rated as critical. Affected by this vulnerability is the function sys_prlimit64 of the file kernel/sys.c. The manipulation leads to race condition.
This vulnerability is referenced as CVE-2025-40201. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.156/6.6.112/6.12.53/6.17.3. This issue affects some unknown processing. Performing a manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-40202. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.53/6.17.3. It has been declared as critical. Affected is the function page_pool_page_is_pp. Executing a manipulation can lead to denial of service.
The identification of this vulnerability is CVE-2025-40199. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.17.3. Affected by this issue is the function squashfs_read_inode. The manipulation results in privilege escalation.
This vulnerability is identified as CVE-2025-40200. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.17.3 and classified as critical. Affected is the function parse_apply_sb_mount_options of the component ext4. Performing a manipulation results in buffer overflow.
This vulnerability is known as CVE-2025-40198. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.113/6.12.53/6.17.3. This affects the function quota_release_work of the file kernel/workqueue.c. This manipulation causes denial of service.
This vulnerability appears as CVE-2025-40196. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.17.3. This impacts an unknown function of the component media. Such manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-40197. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.3. It has been classified as critical. This impacts the function update_qos_request. Performing a manipulation results in state issue.
This vulnerability was named CVE-2025-40194. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.53/6.17.3. The impacted element is the function mnt_ns_release. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-40195. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.112/6.12.53/6.17.3. Affected by this issue is some unknown functionality of the component IPMI Driver. This manipulation causes infinite loop.
This vulnerability is registered as CVE-2025-40192. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.156/6.6.112/6.12.53/6.17.3 and classified as critical. This affects the function memdup_user_nul. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-40193. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.17.3. This affects the function kfd_lookup_process_by_pid of the component amdkfd. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-40191. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.17.3. Affected by this vulnerability is the function ext4_xattr_inode_update_ref of the component ext4. The manipulation results in improper update of reference count.
This vulnerability is cataloged as CVE-2025-40190. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.