{"uuid": "b46a8287-6058-4e0d-aaca-d0a3757c6960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37980\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.\n\ud83d\udccf Published: 2025-05-20T16:58:22.720Z\n\ud83d\udccf Modified: 2025-05-20T16:58:22.720Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/549cbbd14bbec12469ceb279b79c763c8a24224e\n2. https://git.kernel.org/stable/c/41e43134ddda35949974be40520460a12dda3502\n3. https://git.kernel.org/stable/c/55a7bb2708f7c7c5b366d4e40916113168a3824c\n4. https://git.kernel.org/stable/c/40f2eb9b531475dd01b683fdaf61ca3cfd03a51e", "creation_timestamp": "2025-05-20T17:45:52.000000Z"}