Логотип exploitDog
bind:"CVE-2025-38197"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38197"

Количество 7

Количество 7

ubuntu логотип

CVE-2025-38197

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

EPSS: Низкий
redhat логотип

CVE-2025-38197

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-38197

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

EPSS: Низкий
msrc логотип

CVE-2025-38197

13 дней назад

EPSS: Низкий
debian логотип

CVE-2025-38197

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

EPSS: Низкий
github логотип

GHSA-2v3f-mxwm-3xrj

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02853-1

2 дня назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38197

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-38197

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

CVSS3: 7
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-38197

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

0%
Низкий
около 2 месяцев назад
msrc логотип
0%
Низкий
13 дней назад
debian логотип
CVE-2025-38197

In the Linux kernel, the following vulnerability has been resolved: p ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-2v3f-mxwm-3xrj

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell_rbu: Fix list usage Pass the correct list head to list_for_each_entry*() when looping through the packet list. Without this patch, reading the packet data via sysfs will show the data incorrectly (because it starts at the wrong packet), and clearing the packet list will result in a NULL pointer dereference.

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02853-1

Security update for the Linux Kernel

2 дня назад

Уязвимостей на страницу