First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: null - Use spin lock instead of mutex As the null algorithm may be freed in softirq context through af_alg, use spin locks instead of mutexes to protect the default null algorithm.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-37808 is classified as moderate due to potential denial of service risks.
To fix CVE-2025-37808, update your Linux kernel to the latest patch version where the vulnerability has been resolved.
CVE-2025-37808 affects the Linux kernel specifically in implementations using the null cipher algorithm.
Exploitation of CVE-2025-37808 could potentially allow an attacker to cause a denial of service due to improper locking mechanisms.
You can determine if your system is vulnerable to CVE-2025-37808 by checking the version of your Linux kernel against the patched versions.