Use After Free Affecting kernel-uek-container package, versions <0:5.4.17-2136.345.5.3.el7uek


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ORACLE7-KERNELUEKCONTAINER-10762221
  • published16 Jul 2025
  • disclosed1 May 2025

Introduced: 1 May 2025

CVE-2025-37796  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Oracle:7 kernel-uek-container to version 0:5.4.17-2136.345.5.3.el7uek or higher.
This issue was patched in ELSA-2025-20471.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-container package and not the kernel-uek-container package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

wifi: at76c50x: fix use after free access in at76_disconnect

The memory pointed to by priv is freed at the end of at76_delete_device function (using ieee80211_free_hw). But the code then accesses the udev field of the freed object to put the USB device. This may also lead to a memory leak of the usb device. Fix this by using udev from interface.

CVSS Base Scores

version 3.1