In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.
History

Mon, 07 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 04 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.
Title platform/x86: dell_rbu: Fix list usage
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-07-04T13:37:19.926Z

Updated: 2025-07-28T04:14:50.992Z

Reserved: 2025-04-16T04:51:23.993Z

Link: CVE-2025-38197

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-04T14:15:26.913

Modified: 2025-07-08T16:18:53.607

Link: CVE-2025-38197

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-04T00:00:00Z

Links: CVE-2025-38197 - Bugzilla