Логотип exploitDog
bind:CVE-2025-38608
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38608

Количество 44

Количество 44

ubuntu логотип

CVE-2025-38608

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-38608

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38608

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2025-38608

5 месяцев назад

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2025-38608

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-j92m-g7g3-p573

6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-15179

8 месяцев назад

Уязвимость компонентов bpf и ktls ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0202-1

14 дней назад

Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0146-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0284-1

12 дней назад

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0283-1

12 дней назад

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0274-1

12 дней назад

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0270-1

12 дней назад

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0262-1

13 дней назад

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0171-1

16 дней назад

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0148-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0144-1

18 дней назад

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0269-1

12 дней назад

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0206-1

14 дней назад

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0186-1

15 дней назад

Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38608

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-38608

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-38608

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2025-38608

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

CVSS3: 7.1
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-38608

In the Linux kernel, the following vulnerability has been resolved: b ...

CVSS3: 5.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-j92m-g7g3-p573

In the Linux kernel, the following vulnerability has been resolved: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls When sending plaintext data, we initially calculated the corresponding ciphertext length. However, if we later reduced the plaintext data length via socket policy, we failed to recalculate the ciphertext length. This results in transmitting buffers containing uninitialized data during ciphertext transmission. This causes uninitialized bytes to be appended after a complete "Application Data" packet, leading to errors on the receiving end when parsing TLS record.

CVSS3: 5.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-15179

Уязвимость компонентов bpf и ktls ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 7.1
0%
Низкий
8 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0202-1

Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

14 дней назад
suse-cvrf логотип
SUSE-SU-2026:0146-1

Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0284-1

Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0283-1

Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0274-1

Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0270-1

Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0262-1

Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)

13 дней назад
suse-cvrf логотип
SUSE-SU-2026:0171-1

Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7)

16 дней назад
suse-cvrf логотип
SUSE-SU-2026:0148-1

Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0144-1

Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7)

18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0269-1

Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)

12 дней назад
suse-cvrf логотип
SUSE-SU-2026:0206-1

Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5)

14 дней назад
suse-cvrf логотип
SUSE-SU-2026:0186-1

Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5)

15 дней назад

Уязвимостей на страницу