<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 18:21:47 +0000</lastBuildDate>
    <item>
      <title>f6752a6f-892b-4def-ae7d-ae39b7498c45</title>
      <link>https://db.gcve.eu/sighting/f6752a6f-892b-4def-ae7d-ae39b7498c45/export</link>
      <description>{"uuid": "f6752a6f-892b-4def-ae7d-ae39b7498c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37985", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37985\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: wdm: close race between wdm_open and wdm_wwan_port_stop\n\nClearing WDM_WWAN_IN_USE must be the last action or\nwe can open a chardev whose URBs are still poisoned\n\ud83d\udccf Published: 2025-05-20T17:09:18.963Z\n\ud83d\udccf Modified: 2025-05-20T17:09:18.963Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b02a3fef3e8c8fe5a0a266f7a14f38cc608fb167\n2. https://git.kernel.org/stable/c/217fe1fc7d112595a793e02b306710e702eac492\n3. https://git.kernel.org/stable/c/54f7f8978af19f899dec80bcc71c8d4855dfbd72\n4. https://git.kernel.org/stable/c/52ae15c665b5fe5876655aaccc3ef70560b0e314\n5. https://git.kernel.org/stable/c/e3c9adc69357fcbe6253a2bc2588ee4bbaaedbe9\n6. https://git.kernel.org/stable/c/c1846ed4eb527bdfe6b3b7dd2c78e2af4bf98f4f", "creation_timestamp": "2025-05-20T17:45:41.000000Z"}</description>
      <content:encoded>{"uuid": "f6752a6f-892b-4def-ae7d-ae39b7498c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37985", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37985\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: wdm: close race between wdm_open and wdm_wwan_port_stop\n\nClearing WDM_WWAN_IN_USE must be the last action or\nwe can open a chardev whose URBs are still poisoned\n\ud83d\udccf Published: 2025-05-20T17:09:18.963Z\n\ud83d\udccf Modified: 2025-05-20T17:09:18.963Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/b02a3fef3e8c8fe5a0a266f7a14f38cc608fb167\n2. https://git.kernel.org/stable/c/217fe1fc7d112595a793e02b306710e702eac492\n3. https://git.kernel.org/stable/c/54f7f8978af19f899dec80bcc71c8d4855dfbd72\n4. https://git.kernel.org/stable/c/52ae15c665b5fe5876655aaccc3ef70560b0e314\n5. https://git.kernel.org/stable/c/e3c9adc69357fcbe6253a2bc2588ee4bbaaedbe9\n6. https://git.kernel.org/stable/c/c1846ed4eb527bdfe6b3b7dd2c78e2af4bf98f4f", "creation_timestamp": "2025-05-20T17:45:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f6752a6f-892b-4def-ae7d-ae39b7498c45/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:41 +0000</pubDate>
    </item>
    <item>
      <title>3b120a0e-2c73-4ad6-b95f-fab3d19a91cf</title>
      <link>https://db.gcve.eu/sighting/3b120a0e-2c73-4ad6-b95f-fab3d19a91cf/export</link>
      <description>{"uuid": "3b120a0e-2c73-4ad6-b95f-fab3d19a91cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37984", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17031", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37984\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()\n\nHerbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa\nimplementation's -&amp;gt;key_size() callback returns an unusually large value.\nHerbert instead suggests (for a division by 8):\n\n  X / 8 + !!(X &amp;amp; 7)\n\nBased on this formula, introduce a generic DIV_ROUND_UP_POW2() macro and\nuse it in lieu of DIV_ROUND_UP() for -&amp;gt;key_size() return values.\n\nAdditionally, use the macro in ecc_digits_from_bytes(), whose \"nbytes\"\nparameter is a -&amp;gt;key_size() return value in some instances, or a\nuser-specified ASN.1 length in the case of ecdsa_get_signature_rs().\n\ud83d\udccf Published: 2025-05-20T17:09:18.321Z\n\ud83d\udccf Modified: 2025-05-20T17:09:18.321Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/921b8167f10708e38080f84e195cdc68a7a561f1\n2. https://git.kernel.org/stable/c/b16510a530d1e6ab9683f04f8fb34f2e0f538275", "creation_timestamp": "2025-05-20T17:45:42.000000Z"}</description>
      <content:encoded>{"uuid": "3b120a0e-2c73-4ad6-b95f-fab3d19a91cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37984", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17031", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37984\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()\n\nHerbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa\nimplementation's -&amp;gt;key_size() callback returns an unusually large value.\nHerbert instead suggests (for a division by 8):\n\n  X / 8 + !!(X &amp;amp; 7)\n\nBased on this formula, introduce a generic DIV_ROUND_UP_POW2() macro and\nuse it in lieu of DIV_ROUND_UP() for -&amp;gt;key_size() return values.\n\nAdditionally, use the macro in ecc_digits_from_bytes(), whose \"nbytes\"\nparameter is a -&amp;gt;key_size() return value in some instances, or a\nuser-specified ASN.1 length in the case of ecdsa_get_signature_rs().\n\ud83d\udccf Published: 2025-05-20T17:09:18.321Z\n\ud83d\udccf Modified: 2025-05-20T17:09:18.321Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/921b8167f10708e38080f84e195cdc68a7a561f1\n2. https://git.kernel.org/stable/c/b16510a530d1e6ab9683f04f8fb34f2e0f538275", "creation_timestamp": "2025-05-20T17:45:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b120a0e-2c73-4ad6-b95f-fab3d19a91cf/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:42 +0000</pubDate>
    </item>
    <item>
      <title>d889df41-5c1d-4acd-a561-a4ec265512ce</title>
      <link>https://db.gcve.eu/sighting/d889df41-5c1d-4acd-a561-a4ec265512ce/export</link>
      <description>{"uuid": "d889df41-5c1d-4acd-a561-a4ec265512ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37983", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37983\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nqibfs: fix _another_ leak\n\nfailure to allocate inode =&amp;gt; leaked dentry...\n\nthis one had been there since the initial merge; to be fair,\nif we are that far OOM, the odds of failing at that particular\nallocation are low...\n\ud83d\udccf Published: 2025-05-20T17:09:17.666Z\n\ud83d\udccf Modified: 2025-05-20T17:09:17.666Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5e280cce3a29b7fe7b828c6ccd5aa5ba87ceb6b6\n2. https://git.kernel.org/stable/c/3c2fde33e3e505dfd1a895d1f24bad650c655e14\n3. https://git.kernel.org/stable/c/5fe708c5e3c8b2152c6caaa67243e431a5d6cca3\n4. https://git.kernel.org/stable/c/545defa656568c74590317cd30068f85134a8216\n5. https://git.kernel.org/stable/c/5d53e88d8370b9ab14dd830abb410d9a2671edb6\n6. https://git.kernel.org/stable/c/47ab2caba495c1d6a899d284e541a8df656dcfe9\n7. https://git.kernel.org/stable/c/24faa6ea274a2b96d0a78a0996c3137c2b2a65f0\n8. https://git.kernel.org/stable/c/bdb43af4fdb39f844ede401bdb1258f67a580a27", "creation_timestamp": "2025-05-20T17:45:43.000000Z"}</description>
      <content:encoded>{"uuid": "d889df41-5c1d-4acd-a561-a4ec265512ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37983", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37983\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nqibfs: fix _another_ leak\n\nfailure to allocate inode =&amp;gt; leaked dentry...\n\nthis one had been there since the initial merge; to be fair,\nif we are that far OOM, the odds of failing at that particular\nallocation are low...\n\ud83d\udccf Published: 2025-05-20T17:09:17.666Z\n\ud83d\udccf Modified: 2025-05-20T17:09:17.666Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5e280cce3a29b7fe7b828c6ccd5aa5ba87ceb6b6\n2. https://git.kernel.org/stable/c/3c2fde33e3e505dfd1a895d1f24bad650c655e14\n3. https://git.kernel.org/stable/c/5fe708c5e3c8b2152c6caaa67243e431a5d6cca3\n4. https://git.kernel.org/stable/c/545defa656568c74590317cd30068f85134a8216\n5. https://git.kernel.org/stable/c/5d53e88d8370b9ab14dd830abb410d9a2671edb6\n6. https://git.kernel.org/stable/c/47ab2caba495c1d6a899d284e541a8df656dcfe9\n7. https://git.kernel.org/stable/c/24faa6ea274a2b96d0a78a0996c3137c2b2a65f0\n8. https://git.kernel.org/stable/c/bdb43af4fdb39f844ede401bdb1258f67a580a27", "creation_timestamp": "2025-05-20T17:45:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d889df41-5c1d-4acd-a561-a4ec265512ce/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:43 +0000</pubDate>
    </item>
    <item>
      <title>34063cd9-6867-4b22-9558-3c2f931b7f47</title>
      <link>https://db.gcve.eu/sighting/34063cd9-6867-4b22-9558-3c2f931b7f47/export</link>
      <description>{"uuid": "34063cd9-6867-4b22-9558-3c2f931b7f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37982", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37982\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wl1251: fix memory leak in wl1251_tx_work\n\nThe skb dequeued from tx_queue is lost when wl1251_ps_elp_wakeup fails\nwith a -ETIMEDOUT error. Fix that by queueing the skb back to tx_queue.\n\ud83d\udccf Published: 2025-05-20T16:58:23.861Z\n\ud83d\udccf Modified: 2025-05-20T16:58:23.861Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/13c9744c1bcdb5de4e7dc1a78784788ecec52add\n2. https://git.kernel.org/stable/c/f08448a885403722c5c77dae51964badfcb69495\n3. https://git.kernel.org/stable/c/2996144be660d930d5e394652abe08fe89dbe00e\n4. https://git.kernel.org/stable/c/8fd4b9551af214d037fbc9d8e179840b8b917841\n5. https://git.kernel.org/stable/c/4a43fd36710669d67dbb5c16287a58412582ca26\n6. https://git.kernel.org/stable/c/52f224009ce1e44805e6ff3ffc2a06af9c1c3c5b\n7. https://git.kernel.org/stable/c/5a90c29d0204c5ffc45b43b4eced6eef0e19a33a\n8. https://git.kernel.org/stable/c/a0f0dc96de03ffeefc2a177b7f8acde565cb77f4", "creation_timestamp": "2025-05-20T17:45:45.000000Z"}</description>
      <content:encoded>{"uuid": "34063cd9-6867-4b22-9558-3c2f931b7f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37982", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37982\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wl1251: fix memory leak in wl1251_tx_work\n\nThe skb dequeued from tx_queue is lost when wl1251_ps_elp_wakeup fails\nwith a -ETIMEDOUT error. Fix that by queueing the skb back to tx_queue.\n\ud83d\udccf Published: 2025-05-20T16:58:23.861Z\n\ud83d\udccf Modified: 2025-05-20T16:58:23.861Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/13c9744c1bcdb5de4e7dc1a78784788ecec52add\n2. https://git.kernel.org/stable/c/f08448a885403722c5c77dae51964badfcb69495\n3. https://git.kernel.org/stable/c/2996144be660d930d5e394652abe08fe89dbe00e\n4. https://git.kernel.org/stable/c/8fd4b9551af214d037fbc9d8e179840b8b917841\n5. https://git.kernel.org/stable/c/4a43fd36710669d67dbb5c16287a58412582ca26\n6. https://git.kernel.org/stable/c/52f224009ce1e44805e6ff3ffc2a06af9c1c3c5b\n7. https://git.kernel.org/stable/c/5a90c29d0204c5ffc45b43b4eced6eef0e19a33a\n8. https://git.kernel.org/stable/c/a0f0dc96de03ffeefc2a177b7f8acde565cb77f4", "creation_timestamp": "2025-05-20T17:45:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/34063cd9-6867-4b22-9558-3c2f931b7f47/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:45 +0000</pubDate>
    </item>
    <item>
      <title>90dfcb75-25dc-4222-a6d4-00fae1b19e7e</title>
      <link>https://db.gcve.eu/sighting/90dfcb75-25dc-4222-a6d4-00fae1b19e7e/export</link>
      <description>{"uuid": "90dfcb75-25dc-4222-a6d4-00fae1b19e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37981", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37981\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Use is_kdump_kernel() to check for kdump\n\nThe smartpqi driver checks the reset_devices variable to determine\nwhether special adjustments need to be made for kdump. This has the\neffect that after a regular kexec reboot, some driver parameters such as\nmax_transfer_size are much lower than usual. More importantly, kexec\nreboot tests have revealed memory corruption caused by the driver log\nbeing written to system memory after a kexec.\n\nFix this by testing is_kdump_kernel() rather than reset_devices where\nappropriate.\n\ud83d\udccf Published: 2025-05-20T16:58:23.299Z\n\ud83d\udccf Modified: 2025-05-20T16:58:23.299Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7cc670e8ebaa5241dd99c0ad75eceb8f8f64f607\n2. https://git.kernel.org/stable/c/ebf673c76ce91e612a882dfaa9a3824962994aae\n3. https://git.kernel.org/stable/c/a2d5a0072235a69749ceb04c1a26dc75df66a31a", "creation_timestamp": "2025-05-20T17:45:46.000000Z"}</description>
      <content:encoded>{"uuid": "90dfcb75-25dc-4222-a6d4-00fae1b19e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37981", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37981\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Use is_kdump_kernel() to check for kdump\n\nThe smartpqi driver checks the reset_devices variable to determine\nwhether special adjustments need to be made for kdump. This has the\neffect that after a regular kexec reboot, some driver parameters such as\nmax_transfer_size are much lower than usual. More importantly, kexec\nreboot tests have revealed memory corruption caused by the driver log\nbeing written to system memory after a kexec.\n\nFix this by testing is_kdump_kernel() rather than reset_devices where\nappropriate.\n\ud83d\udccf Published: 2025-05-20T16:58:23.299Z\n\ud83d\udccf Modified: 2025-05-20T16:58:23.299Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7cc670e8ebaa5241dd99c0ad75eceb8f8f64f607\n2. https://git.kernel.org/stable/c/ebf673c76ce91e612a882dfaa9a3824962994aae\n3. https://git.kernel.org/stable/c/a2d5a0072235a69749ceb04c1a26dc75df66a31a", "creation_timestamp": "2025-05-20T17:45:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/90dfcb75-25dc-4222-a6d4-00fae1b19e7e/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:46 +0000</pubDate>
    </item>
    <item>
      <title>b46a8287-6058-4e0d-aaca-d0a3757c6960</title>
      <link>https://db.gcve.eu/sighting/b46a8287-6058-4e0d-aaca-d0a3757c6960/export</link>
      <description>{"uuid": "b46a8287-6058-4e0d-aaca-d0a3757c6960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37980\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.\n\ud83d\udccf Published: 2025-05-20T16:58:22.720Z\n\ud83d\udccf Modified: 2025-05-20T16:58:22.720Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/549cbbd14bbec12469ceb279b79c763c8a24224e\n2. https://git.kernel.org/stable/c/41e43134ddda35949974be40520460a12dda3502\n3. https://git.kernel.org/stable/c/55a7bb2708f7c7c5b366d4e40916113168a3824c\n4. https://git.kernel.org/stable/c/40f2eb9b531475dd01b683fdaf61ca3cfd03a51e", "creation_timestamp": "2025-05-20T17:45:52.000000Z"}</description>
      <content:encoded>{"uuid": "b46a8287-6058-4e0d-aaca-d0a3757c6960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17036", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37980\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix resource leak in blk_register_queue() error path\n\nWhen registering a queue fails after blk_mq_sysfs_register() is\nsuccessful but the function later encounters an error, we need\nto clean up the blk_mq_sysfs resources.\n\nAdd the missing blk_mq_sysfs_unregister() call in the error path\nto properly clean up these resources and prevent a memory leak.\n\ud83d\udccf Published: 2025-05-20T16:58:22.720Z\n\ud83d\udccf Modified: 2025-05-20T16:58:22.720Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/549cbbd14bbec12469ceb279b79c763c8a24224e\n2. https://git.kernel.org/stable/c/41e43134ddda35949974be40520460a12dda3502\n3. https://git.kernel.org/stable/c/55a7bb2708f7c7c5b366d4e40916113168a3824c\n4. https://git.kernel.org/stable/c/40f2eb9b531475dd01b683fdaf61ca3cfd03a51e", "creation_timestamp": "2025-05-20T17:45:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b46a8287-6058-4e0d-aaca-d0a3757c6960/export</guid>
      <pubDate>Tue, 20 May 2025 17:45:52 +0000</pubDate>
    </item>
    <item>
      <title>cec63ccd-64e4-4386-ac67-32f875194383</title>
      <link>https://db.gcve.eu/sighting/cec63ccd-64e4-4386-ac67-32f875194383/export</link>
      <description>{"uuid": "cec63ccd-64e4-4386-ac67-32f875194383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37981", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114541968902367001", "content": "", "creation_timestamp": "2025-05-20T20:09:02.679016Z"}</description>
      <content:encoded>{"uuid": "cec63ccd-64e4-4386-ac67-32f875194383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37981", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114541968902367001", "content": "", "creation_timestamp": "2025-05-20T20:09:02.679016Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cec63ccd-64e4-4386-ac67-32f875194383/export</guid>
      <pubDate>Tue, 20 May 2025 20:09:02 +0000</pubDate>
    </item>
    <item>
      <title>f1b3e3d4-18c3-4912-9d32-227ac59b1a4e</title>
      <link>https://db.gcve.eu/sighting/f1b3e3d4-18c3-4912-9d32-227ac59b1a4e/export</link>
      <description>{"uuid": "f1b3e3d4-18c3-4912-9d32-227ac59b1a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</description>
      <content:encoded>{"uuid": "f1b3e3d4-18c3-4912-9d32-227ac59b1a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f1b3e3d4-18c3-4912-9d32-227ac59b1a4e/export</guid>
      <pubDate>Wed, 03 Dec 2025 14:14:49 +0000</pubDate>
    </item>
    <item>
      <title>f55e6ac8-0765-4216-813a-7b645dc4369c</title>
      <link>https://db.gcve.eu/sighting/f55e6ac8-0765-4216-813a-7b645dc4369c/export</link>
      <description>{"uuid": "f55e6ac8-0765-4216-813a-7b645dc4369c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "f55e6ac8-0765-4216-813a-7b645dc4369c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37980", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f55e6ac8-0765-4216-813a-7b645dc4369c/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>01dd36b4-287b-4b71-b52f-8ffea2fe1048</title>
      <link>https://db.gcve.eu/sighting/01dd36b4-287b-4b71-b52f-8ffea2fe1048/export</link>
      <description>{"uuid": "01dd36b4-287b-4b71-b52f-8ffea2fe1048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37984", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "01dd36b4-287b-4b71-b52f-8ffea2fe1048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37984", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/01dd36b4-287b-4b71-b52f-8ffea2fe1048/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
