### [CVE-2025-38197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38197) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=d19f359fbdc6b5d49e9b9a0db27a996b28a2ded3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:platform/x86: dell_rbu: Fix list usagePass the correct list head to list_for_each_entry*() when looping throughthe packet list.Without this patch, reading the packet data via sysfs will show the dataincorrectly (because it starts at the wrong packet), and clearing thepacket list will result in a NULL pointer dereference. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security