CVE-2025-38608
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-19

Last updated on: 2025-11-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-19
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel 6.1.153
linux kernel 5.10.244
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves the bpf and ktls components. When sending plaintext data, the system initially calculates the corresponding ciphertext length. However, if the plaintext data length is later reduced due to a socket policy, the ciphertext length is not recalculated. This causes buffers with uninitialized data to be transmitted during ciphertext transmission, resulting in uninitialized bytes being appended after a complete "Application Data" packet. This leads to errors on the receiving end when parsing the TLS record.


How can this vulnerability impact me? :

The vulnerability can cause data corruption during TLS transmission by appending uninitialized bytes to the ciphertext. This may lead to errors when the receiving system attempts to parse the TLS records, potentially disrupting secure communications or causing application errors.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart