CVE-2025-37808

In the Linux kernel, the following vulnerability has been resolved: crypto: null - Use spin lock instead of mutex As the null algorithm may be freed in softirq context through af_alg, use spin locks instead of mutexes to protect the default null algorithm.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

10 Nov 2025, 17:31

Type Values Removed Values Added
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0486de3c1b8223138dcc614846bd76364f758de6 - () https://git.kernel.org/stable/c/0486de3c1b8223138dcc614846bd76364f758de6 - Patch
References () https://git.kernel.org/stable/c/1b66a5920b7fc7cc6251192a3fcad115b6d75dd5 - () https://git.kernel.org/stable/c/1b66a5920b7fc7cc6251192a3fcad115b6d75dd5 - Patch
References () https://git.kernel.org/stable/c/1dd4a8561d85dea545cf93f56efc48df8176e218 - () https://git.kernel.org/stable/c/1dd4a8561d85dea545cf93f56efc48df8176e218 - Patch
References () https://git.kernel.org/stable/c/8cf2945512a8c0ef74ddd5b5a4f6b6a2fb1a4efb - () https://git.kernel.org/stable/c/8cf2945512a8c0ef74ddd5b5a4f6b6a2fb1a4efb - Patch
References () https://git.kernel.org/stable/c/dcc47a028c24e793ce6d6efebfef1a1e92f80297 - () https://git.kernel.org/stable/c/dcc47a028c24e793ce6d6efebfef1a1e92f80297 - Patch
References () https://git.kernel.org/stable/c/e27244cbe10658a66b8775be7f0acc4ad2f618d6 - () https://git.kernel.org/stable/c/e27244cbe10658a66b8775be7f0acc4ad2f618d6 - Patch
References () https://git.kernel.org/stable/c/e307c54ac8198bf09652c72603ba6e6d97798410 - () https://git.kernel.org/stable/c/e307c54ac8198bf09652c72603ba6e6d97798410 - Patch
References () https://git.kernel.org/stable/c/f7a5a5c8e1ec16a4b2041398abe95de0e14572ef - () https://git.kernel.org/stable/c/f7a5a5c8e1ec16a4b2041398abe95de0e14572ef - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: null - Utilizar bloqueo de giro en lugar de mutex Como el algoritmo nulo se puede liberar en el contexto de softirq a través de af_alg, utilice bloqueos de giro en lugar de mutex para proteger el algoritmo nulo predeterminado.

08 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 07:15

Updated : 2025-11-10 17:31


NVD link : CVE-2025-37808

Mitre link : CVE-2025-37808

CVE.ORG link : CVE-2025-37808


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel