{"vulnerability": "CVE-2025-37978", "sightings": [{"uuid": "0f3470dd-682b-42d8-af1f-6219cd454ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37978", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114541915882776475", "content": "", "creation_timestamp": "2025-05-20T19:55:33.742948Z"}, {"uuid": "9e99a36d-ae69-473b-9b70-3a595fa851ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37978", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37978\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblock: integrity: Do not call set_page_dirty_lock()\n\nPlacing multiple protection information buffers inside the same page\ncan lead to oopses because set_page_dirty_lock() can't be called from\ninterrupt context.\n\nSince a protection information buffer is not backed by a file there is\nno point in setting its page dirty, there is nothing to synchronize.\nDrop the call to set_page_dirty_lock() and remove the last argument to\nbio_integrity_unpin_bvec().\n\ud83d\udccf Published: 2025-05-20T16:58:21.422Z\n\ud83d\udccf Modified: 2025-05-20T16:58:21.422Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c38a005e6efb9ddfa06bd8353b82379d6fd5d6c4\n2. https://git.kernel.org/stable/c/9487fc1a10b3aa89feb24e7cedeccaaf63074617\n3. https://git.kernel.org/stable/c/39e160505198ff8c158f11bce2ba19809a756e8b", "creation_timestamp": "2025-05-20T17:46:53.000000Z"}]}