{"id":"CVE-2025-37796","summary":"wifi: at76c50x: fix use after free access in at76_disconnect","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: at76c50x: fix use after free access in at76_disconnect\n\nThe memory pointed to by priv is freed at the end of at76_delete_device\nfunction (using ieee80211_free_hw). But the code then accesses the udev\nfield of the freed object to put the USB device. This may also lead to a\nmemory leak of the usb device. Fix this by using udev from interface.","modified":"2026-04-02T12:47:29.937799Z","published":"2025-05-01T13:07:27.694Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37796.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/152721cbae42713ecfbca6847e0f102ee6b19546"},{"type":"WEB","url":"https://git.kernel.org/stable/c/27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3c619aec1f538333b56746d2f796aab1bca5c9a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e7df74745700f059dc117a620e566964a2e8f2c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ca513631fa6ad3011b8b9197cdde0f351103704"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9682bfef2cf3802515a902e964d774e137be1b9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37796.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37796"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"29e20aa6c6aff35c81d4da2e2cd516dadb569061"},{"fixed":"c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6"},{"fixed":"6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f"},{"fixed":"3c619aec1f538333b56746d2f796aab1bca5c9a5"},{"fixed":"5e7df74745700f059dc117a620e566964a2e8f2c"},{"fixed":"7ca513631fa6ad3011b8b9197cdde0f351103704"},{"fixed":"a9682bfef2cf3802515a902e964d774e137be1b9"},{"fixed":"152721cbae42713ecfbca6847e0f102ee6b19546"},{"fixed":"27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37796.json"}}],"schema_version":"1.7.5"}