CVE-2025-40129
Description
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: fix null pointer dereference on zero-length checksum
In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes checksum.data to be set to NULL. This triggers a NPD when accessing checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that the value of checksum.len is not less than XDR_UNIT.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in Linux kernel's sunrpc module, triggered by a zero-length checksum in xdr_stream_decode_opaque_auth(), can be exploited to cause a crash.
Vulnerability
Overview
In the Linux kernel, the sunrpc module's xdr_stream_decode_opaque_auth() function fails to properly validate the length of a checksum field. When the checksum length is zero, the function sets the checksum data pointer to NULL pointer, leading to a null pointer dereference (NPD) when the data is later accessed in gss_krb5_verify_mic_v2(). This flaw can be triggered by a crafted RPC messages with a zero-length checksum, causing a kernel crash [1].
Attack
Vector
An attacker can exploit this vulnerability by sending a crafted RPC message with a zero-length checksum field to a system using the kernel's sunrpc module. The attack requires network access to the target, but no authentication is needed to trigger the null pointer dereference. The vulnerability is in the parsing of opaque authentication data, which is processed before any authentication checks [1].
Impact
Successful exploitation results in a denial of service (DoS) through a kernel crash. The null pointer dereference causes an immediate system panic or oops, making the system unavailable. There is no evidence of privilege escalation or remote code execution from this vulnerability [1].
Mitigation
The fix ensures that the checksum length is not less than XDR_UNIT (4 bytes), preventing the null pointer assignment. The patch has been applied to the Linux kernel stable tree. Users should update to a patched kernel version to mitigate the issue [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
481cec07d3031affc03d44921ab9a70cd23866df164e29bd4Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.