Unrated severityNVD Advisory· Published Aug 19, 2025· Updated Nov 3, 2025
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
CVE-2025-38608
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length.
This results in transmitting buffers containing uninitialized data during ciphertext transmission.
This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
Affected products
2- Linux/Linuxv5Range: 5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/0e853c1464bcf61207f8b5c32d2ac5ee495e859dmitre
- git.kernel.org/stable/c/16aca8bb4ad0d8a13c8b6da4007f4e52d53035bbmitre
- git.kernel.org/stable/c/178f6a5c8cb3b6be1602de0964cd440243f493c9mitre
- git.kernel.org/stable/c/1e480387d4b42776f8957fb148af9d75ce93b96dmitre
- git.kernel.org/stable/c/6ba20ff3cdb96a908b9dc93cf247d0b087672e7cmitre
- git.kernel.org/stable/c/73fc5d04009d3969ff8e8574f0fd769f04124e59mitre
- git.kernel.org/stable/c/849d24dc5aed45ebeb3490df429356739256ac40mitre
- git.kernel.org/stable/c/90d6ef67440cec2a0aad71a0108c8f216437345cmitre
- git.kernel.org/stable/c/ee03766d79de0f61ea29ffb6ab1c7b196ea1b02emitre
News mentions
0No linked articles in our index yet.