<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:01:28 +0000</lastBuildDate>
    <item>
      <title>70789968-da52-4195-ac70-24b0f2c9441e</title>
      <link>https://vulnerability.circl.lu/sighting/70789968-da52-4195-ac70-24b0f2c9441e/export</link>
      <description>{"uuid": "70789968-da52-4195-ac70-24b0f2c9441e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37796", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14451", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37796\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: at76c50x: fix use after free access in at76_disconnect\n\nThe memory pointed to by priv is freed at the end of at76_delete_device\nfunction (using ieee80211_free_hw). But the code then accesses the udev\nfield of the freed object to put the USB device. This may also lead to a\nmemory leak of the usb device. Fix this by using udev from interface.\n\ud83d\udccf Published: 2025-05-01T13:07:27.694Z\n\ud83d\udccf Modified: 2025-05-02T06:16:35.629Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6\n2. https://git.kernel.org/stable/c/6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f\n3. https://git.kernel.org/stable/c/3c619aec1f538333b56746d2f796aab1bca5c9a5\n4. https://git.kernel.org/stable/c/5e7df74745700f059dc117a620e566964a2e8f2c\n5. https://git.kernel.org/stable/c/7ca513631fa6ad3011b8b9197cdde0f351103704\n6. https://git.kernel.org/stable/c/a9682bfef2cf3802515a902e964d774e137be1b9\n7. https://git.kernel.org/stable/c/152721cbae42713ecfbca6847e0f102ee6b19546\n8. https://git.kernel.org/stable/c/27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da", "creation_timestamp": "2025-05-02T07:16:20.000000Z"}</description>
      <content:encoded>{"uuid": "70789968-da52-4195-ac70-24b0f2c9441e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37796", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14451", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37796\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: at76c50x: fix use after free access in at76_disconnect\n\nThe memory pointed to by priv is freed at the end of at76_delete_device\nfunction (using ieee80211_free_hw). But the code then accesses the udev\nfield of the freed object to put the USB device. This may also lead to a\nmemory leak of the usb device. Fix this by using udev from interface.\n\ud83d\udccf Published: 2025-05-01T13:07:27.694Z\n\ud83d\udccf Modified: 2025-05-02T06:16:35.629Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6\n2. https://git.kernel.org/stable/c/6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f\n3. https://git.kernel.org/stable/c/3c619aec1f538333b56746d2f796aab1bca5c9a5\n4. https://git.kernel.org/stable/c/5e7df74745700f059dc117a620e566964a2e8f2c\n5. https://git.kernel.org/stable/c/7ca513631fa6ad3011b8b9197cdde0f351103704\n6. https://git.kernel.org/stable/c/a9682bfef2cf3802515a902e964d774e137be1b9\n7. https://git.kernel.org/stable/c/152721cbae42713ecfbca6847e0f102ee6b19546\n8. https://git.kernel.org/stable/c/27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da", "creation_timestamp": "2025-05-02T07:16:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/70789968-da52-4195-ac70-24b0f2c9441e/export</guid>
      <pubDate>Fri, 02 May 2025 07:16:20 +0000</pubDate>
    </item>
  </channel>
</rss>
