CVE-2025-38608

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 18:33

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-908
References () https://git.kernel.org/stable/c/0e853c1464bcf61207f8b5c32d2ac5ee495e859d - () https://git.kernel.org/stable/c/0e853c1464bcf61207f8b5c32d2ac5ee495e859d - Patch
References () https://git.kernel.org/stable/c/16aca8bb4ad0d8a13c8b6da4007f4e52d53035bb - () https://git.kernel.org/stable/c/16aca8bb4ad0d8a13c8b6da4007f4e52d53035bb - Patch
References () https://git.kernel.org/stable/c/178f6a5c8cb3b6be1602de0964cd440243f493c9 - () https://git.kernel.org/stable/c/178f6a5c8cb3b6be1602de0964cd440243f493c9 - Patch
References () https://git.kernel.org/stable/c/1e480387d4b42776f8957fb148af9d75ce93b96d - () https://git.kernel.org/stable/c/1e480387d4b42776f8957fb148af9d75ce93b96d - Patch
References () https://git.kernel.org/stable/c/6ba20ff3cdb96a908b9dc93cf247d0b087672e7c - () https://git.kernel.org/stable/c/6ba20ff3cdb96a908b9dc93cf247d0b087672e7c - Patch
References () https://git.kernel.org/stable/c/73fc5d04009d3969ff8e8574f0fd769f04124e59 - () https://git.kernel.org/stable/c/73fc5d04009d3969ff8e8574f0fd769f04124e59 - Patch
References () https://git.kernel.org/stable/c/849d24dc5aed45ebeb3490df429356739256ac40 - () https://git.kernel.org/stable/c/849d24dc5aed45ebeb3490df429356739256ac40 - Patch
References () https://git.kernel.org/stable/c/90d6ef67440cec2a0aad71a0108c8f216437345c - () https://git.kernel.org/stable/c/90d6ef67440cec2a0aad71a0108c8f216437345c - Patch
References () https://git.kernel.org/stable/c/ee03766d79de0f61ea29ffb6ab1c7b196ea1b02e - () https://git.kernel.org/stable/c/ee03766d79de0f61ea29ffb6ab1c7b196ea1b02e - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/6ba20ff3cdb96a908b9dc93cf247d0b087672e7c -
  • () https://git.kernel.org/stable/c/73fc5d04009d3969ff8e8574f0fd769f04124e59 -
  • () https://git.kernel.org/stable/c/849d24dc5aed45ebeb3490df429356739256ac40 -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, ktls: Se corrige la corrupción de datos al usar bpf_msg_pop_data() en ktls. Al enviar datos de texto plano, inicialmente se calculaba la longitud del texto cifrado correspondiente. Sin embargo, si posteriormente se reducía la longitud de los datos de texto plano mediante la política de socket, no se podía recalcular la longitud del texto cifrado. Esto provoca que se transmitan búferes con datos sin inicializar durante la transmisión del texto cifrado. Esto provoca que se añadan bytes sin inicializar después de un paquete completo de "Datos de Aplicación", lo que genera errores en el receptor al analizar el registro TLS.

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-07 18:33


NVD link : CVE-2025-38608

Mitre link : CVE-2025-38608

CVE.ORG link : CVE-2025-38608


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource