VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40129

CVE-2025-40129

Description

In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix null pointer dereference on zero-length checksum

In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes checksum.data to be set to NULL. This triggers a NPD when accessing checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that the value of checksum.len is not less than XDR_UNIT.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in Linux kernel's sunrpc module, triggered by a zero-length checksum in xdr_stream_decode_opaque_auth(), can be exploited to cause a crash.

Vulnerability

Overview

In the Linux kernel, the sunrpc module's xdr_stream_decode_opaque_auth() function fails to properly validate the length of a checksum field. When the checksum length is zero, the function sets the checksum data pointer to NULL pointer, leading to a null pointer dereference (NPD) when the data is later accessed in gss_krb5_verify_mic_v2(). This flaw can be triggered by a crafted RPC messages with a zero-length checksum, causing a kernel crash [1].

Attack

Vector

An attacker can exploit this vulnerability by sending a crafted RPC message with a zero-length checksum field to a system using the kernel's sunrpc module. The attack requires network access to the target, but no authentication is needed to trigger the null pointer dereference. The vulnerability is in the parsing of opaque authentication data, which is processed before any authentication checks [1].

Impact

Successful exploitation results in a denial of service (DoS) through a kernel crash. The null pointer dereference causes an immediate system panic or oops, making the system unavailable. There is no evidence of privilege escalation or remote code execution from this vulnerability [1].

Mitigation

The fix ensures that the checksum length is not less than XDR_UNIT (4 bytes), preventing the null pointer assignment. The patch has been applied to the Linux kernel stable tree. Users should update to a patched kernel version to mitigate the issue [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.