CVE-2025-37796

Source
https://cve.org/CVERecord?id=CVE-2025-37796
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37796.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37796
Downstream
Related
Published
2025-05-01T13:07:27.694Z
Modified
2026-03-11T07:48:35.914526Z
Summary
wifi: at76c50x: fix use after free access in at76_disconnect
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: at76c50x: fix use after free access in at76_disconnect

The memory pointed to by priv is freed at the end of at76deletedevice function (using ieee80211freehw). But the code then accesses the udev field of the freed object to put the USB device. This may also lead to a memory leak of the usb device. Fix this by using udev from interface.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37796.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
29e20aa6c6aff35c81d4da2e2cd516dadb569061
Fixed
c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6
Fixed
6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f
Fixed
3c619aec1f538333b56746d2f796aab1bca5c9a5
Fixed
5e7df74745700f059dc117a620e566964a2e8f2c
Fixed
7ca513631fa6ad3011b8b9197cdde0f351103704
Fixed
a9682bfef2cf3802515a902e964d774e137be1b9
Fixed
152721cbae42713ecfbca6847e0f102ee6b19546
Fixed
27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37796.json"