Количество 42
Количество 42
BDU:2025-15179
Уязвимость компонентов bpf и ktls ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
CVE-2025-38608
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
CVE-2025-38608
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
CVE-2025-38608
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
CVE-2025-38608
bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
CVE-2025-38608
In the Linux kernel, the following vulnerability has been resolved: b ...
GHSA-j92m-g7g3-p573
In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.
SUSE-SU-2026:0202-1
Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0146-1
Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0274-1
Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0270-1
Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0262-1
Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0171-1
Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0148-1
Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0144-1
Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0269-1
Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0206-1
Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0186-1
Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0184-1
Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5)
SUSE-SU-2026:0180-1
Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-15179 Уязвимость компонентов bpf и ktls ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
CVE-2025-38608 In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record. | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-38608 In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record. | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-38608 In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record. | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
CVE-2025-38608 bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls | CVSS3: 7.1 | 0% Низкий | 5 месяцев назад | |
CVE-2025-38608 In the Linux kernel, the following vulnerability has been resolved: b ... | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
GHSA-j92m-g7g3-p573 In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record. | CVSS3: 5.5 | 0% Низкий | 6 месяцев назад | |
SUSE-SU-2026:0202-1 Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 14 дней назад | |||
SUSE-SU-2026:0146-1 Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 18 дней назад | |||
SUSE-SU-2026:0274-1 Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 12 дней назад | |||
SUSE-SU-2026:0270-1 Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 12 дней назад | |||
SUSE-SU-2026:0262-1 Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6) | 13 дней назад | |||
SUSE-SU-2026:0171-1 Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 16 дней назад | |||
SUSE-SU-2026:0148-1 Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 18 дней назад | |||
SUSE-SU-2026:0144-1 Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 18 дней назад | |||
SUSE-SU-2026:0269-1 Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 12 дней назад | |||
SUSE-SU-2026:0206-1 Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 14 дней назад | |||
SUSE-SU-2026:0186-1 Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 15 дней назад | |||
SUSE-SU-2026:0184-1 Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 16 дней назад | |||
SUSE-SU-2026:0180-1 Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 16 дней назад |
Уязвимостей на страницу