In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell_rbu: Fix list usage
Pass the correct list head to list_for_each_entry*() when looping through
the packet list.
Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
platform/x86: dell_rbu: Fix list usage
Pass the correct list head to list_for_each_entry*() when looping through
the packet list.
Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 07 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 04 Jul 2025 13:45:00 +0000

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-07-28T04:14:50.992Z
Reserved: 2025-04-16T04:51:23.993Z
Link: CVE-2025-38197

No data.

Status : Awaiting Analysis
Published: 2025-07-04T14:15:26.913
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-38197


Updated: 2025-07-13T21:47:52Z