In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell_rbu: Fix list usage
Pass the correct list head to list_for_each_entry*() when looping through
the packet list.
Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 04 Jul 2025 13:45:00 +0000
Status: PUBLISHED
Assigner: Linux
Published: 2025-07-04T13:37:19.926Z
Updated: 2025-07-28T04:14:50.992Z
Reserved: 2025-04-16T04:51:23.993Z
Link: CVE-2025-38197
No data.
Status : Awaiting Analysis
Published: 2025-07-04T14:15:26.913
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-38197