{"vulnerability": "CVE-2025-37817", "sightings": [{"uuid": "818f24a5-34a6-4767-b9e8-c7e989ee5b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37817", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37817\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix a double free bug in chameleon_parse_gdd()\n\nIn chameleon_parse_gdd(), if mcb_device_register() fails, 'mdev'\nwould be released in mcb_device_register() via put_device().\nThus, goto 'err' label and free 'mdev' again causes a double free.\nJust return if mcb_device_register() fails.\n\ud83d\udccf Published: 2025-05-08T06:26:12.683Z\n\ud83d\udccf Modified: 2025-05-08T06:26:12.683Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/d70184958b0ea8c0fd52e2b456654b503e769fc8\n2. https://git.kernel.org/stable/c/4ffe8c9fb561e4427dd1a3056cd5b3685b74f78d\n3. https://git.kernel.org/stable/c/59f993cd36b6e28a394ba3d977e8ffe5c9884e3b\n4. https://git.kernel.org/stable/c/c5b8a549ef1fcc6066b037a3962c79d60465ba0b\n5. https://git.kernel.org/stable/c/96838eb1836fd372e42be5db84f0b333b65146a6\n6. https://git.kernel.org/stable/c/df1a5d5c6134224f9298e5189230f9d29ae50cac\n7. https://git.kernel.org/stable/c/bcc7d58ee5173e34306026bd01e1fbf75e169d37\n8. https://git.kernel.org/stable/c/7c7f1bfdb2249f854a736d9b79778c7e5a29a150", "creation_timestamp": "2025-05-08T07:23:20.000000Z"}, {"uuid": "64a63007-45d7-4d68-87fe-8a79c963d940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37817", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loniqr33wi2l", "content": "", "creation_timestamp": "2025-05-08T08:31:37.027797Z"}]}