{"vulnerability": "CVE-2025-37874", "sightings": [{"uuid": "62e57a23-ef2f-4562-9ab6-a37a87bb76cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37874", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37874\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ngbe: fix memory leak in ngbe_probe() error path\n\nWhen ngbe_sw_init() is called, memory is allocated for wx-&gt;rss_key\nin wx_init_rss_key(). However, in ngbe_probe() function, the subsequent\nerror paths after ngbe_sw_init() don't free the rss_key. Fix that by\nfreeing it in error path along with wx-&gt;mac_table.\n\nAlso change the label to which execution jumps when ngbe_sw_init()\nfails, because otherwise, it could lead to a double free for rss_key,\nwhen the mac_table allocation fails in wx_sw_init().\n\ud83d\udccf Published: 2025-05-09T06:44:02.314Z\n\ud83d\udccf Modified: 2025-05-09T06:44:02.314Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7c2b66a31c7a4866400f7e6fb43cb32021bfca01\n2. https://git.kernel.org/stable/c/8335a3feb9d0d97e5e8f76d38b6bb8573d5b4a29\n3. https://git.kernel.org/stable/c/397487338eff1891c4654ce7deaafbf72a1688b2\n4. https://git.kernel.org/stable/c/88fa80021b77732bc98f73fb69d69c7cc37b9f0d", "creation_timestamp": "2025-05-09T07:25:43.000000Z"}, {"uuid": "cabc8186-dd2c-4e83-9cb4-146d31969112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37874", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114479439792019818", "content": "", "creation_timestamp": "2025-05-09T19:07:04.246209Z"}]}