CVE-2025-38608
MEDIUMLinux Kernel < 5.4.297 - Use of Uninitialized Resource
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
References (11)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
3.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-908
Status
published
Products (10)
debian/debian_linux
11.0
linux/Kernel
5.0.0 - 5.4.297linux
linux/Kernel
5.11.0 - 5.15.190linux
linux/Kernel
5.16.0 - 6.1.148linux
linux/Kernel
5.5.0 - 5.10.241linux
linux/Kernel
6.13.0 - 6.15.10linux
linux/Kernel
6.16.0 - 6.16.1linux
linux/Kernel
6.2.0 - 6.6.102linux
linux/Kernel
6.7.0 - 6.12.42linux
linux/linux_kernel
5.0 - 5.4.297
Published
Aug 19, 2025
Tracked Since
Feb 18, 2026