CVE-2025-38197

NameCVE-2025-38197
DescriptionIn the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.237-1vulnerable
bookworm6.1.137-1vulnerable
bookworm (security)6.1.140-1vulnerable
trixie6.12.33-1vulnerable
trixie (security)6.12.31-1vulnerable
sid6.12.35-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)6.12.35-1

Notes

https://git.kernel.org/linus/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854 (6.16-rc3)

Search for package or bug name: Reporting problems