In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell_rbu: Fix list usage
Pass the correct list head to list_for_each_entry*() when looping through
the packet list.
Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 04 Jul 2025 13:45:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-04T13:37:19.926Z
Updated: 2025-07-28T04:14:50.992Z
Reserved: 2025-04-16T04:51:23.993Z
Link: CVE-2025-38197

No data.

Status : Awaiting Analysis
Published: 2025-07-04T14:15:26.913
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-38197
