CVE-2025-38608

MEDIUM

Linux Kernel < 5.4.297 - Use of Uninitialized Resource

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 3.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-908
Status published
Products (10)
debian/debian_linux 11.0
linux/Kernel 5.0.0 - 5.4.297linux
linux/Kernel 5.11.0 - 5.15.190linux
linux/Kernel 5.16.0 - 6.1.148linux
linux/Kernel 5.5.0 - 5.10.241linux
linux/Kernel 6.13.0 - 6.15.10linux
linux/Kernel 6.16.0 - 6.16.1linux
linux/Kernel 6.2.0 - 6.6.102linux
linux/Kernel 6.7.0 - 6.12.42linux
linux/linux_kernel 5.0 - 5.4.297
Published Aug 19, 2025
Tracked Since Feb 18, 2026