In the Linux kernel, the following vulnerability has been resolved:
platform/x86: dell_rbu: Fix list usage
Pass the correct list head to list_for_each_entry*() when looping through
the packet list.
Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Dec 2025, 21:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/07d7b8e7ef7d1f812a6211ed531947c56d09e95e - Patch | |
| References | () https://git.kernel.org/stable/c/32d05e6cc3a7bf6c8f16f7b7ef8fe80eca0c233e - Patch | |
| References | () https://git.kernel.org/stable/c/4d71f2c1e5263a9f042faa71d59515709869dc79 - Patch | |
| References | () https://git.kernel.org/stable/c/5e8c658acd1b7c186aeffa46bf08795e121f401a - Patch | |
| References | () https://git.kernel.org/stable/c/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854 - Patch | |
| References | () https://git.kernel.org/stable/c/a7b477b64ef5e37cb08dd536ae07c46f9f28262e - Patch | |
| References | () https://git.kernel.org/stable/c/f3b840fb1508a80cd8a0efb5c886ae1995a88b24 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-476 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Jul 2025, 16:18
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
04 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-04 14:15
Updated : 2025-12-18 21:26
NVD link : CVE-2025-38197
Mitre link : CVE-2025-38197
CVE.ORG link : CVE-2025-38197
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
