{"id":"CVE-2025-40129","summary":"sunrpc: fix null pointer dereference on zero-length checksum","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.","modified":"2026-03-20T12:43:11.099904Z","published":"2025-11-12T10:23:21.327Z","related":["SUSE-SU-2025:4393-1","SUSE-SU-2025:4422-1","SUSE-SU-2025:4505-1","SUSE-SU-2025:4516-1","SUSE-SU-2025:4517-1","SUSE-SU-2025:4521-1","SUSE-SU-2026:0487-1","SUSE-SU-2026:0489-1","SUSE-SU-2026:0490-1","SUSE-SU-2026:0491-1","SUSE-SU-2026:0543-1","SUSE-SU-2026:0546-1","SUSE-SU-2026:0548-1","SUSE-SU-2026:0550-1","SUSE-SU-2026:0551-1","SUSE-SU-2026:0554-1","SUSE-SU-2026:0555-1","SUSE-SU-2026:0556-1","SUSE-SU-2026:0557-1","SUSE-SU-2026:0560-1","SUSE-SU-2026:0561-1","SUSE-SU-2026:20012-1","SUSE-SU-2026:20015-1","SUSE-SU-2026:20021-1","SUSE-SU-2026:20039-1","SUSE-SU-2026:20059-1","SUSE-SU-2026:20455-1","SUSE-SU-2026:20456-1","SUSE-SU-2026:20457-1","SUSE-SU-2026:20458-1","SUSE-SU-2026:20459-1","SUSE-SU-2026:20460-1","SUSE-SU-2026:20461-1","SUSE-SU-2026:20462-1","SUSE-SU-2026:20463-1","SUSE-SU-2026:20464-1","SUSE-SU-2026:20465-1","SUSE-SU-2026:20466-1","SUSE-SU-2026:20467-1","SUSE-SU-2026:20468-1","SUSE-SU-2026:20469-1","SUSE-SU-2026:20470-1","SUSE-SU-2026:20471-1","SUSE-SU-2026:20472-1","SUSE-SU-2026:20473-1","SUSE-SU-2026:20496-1","SUSE-SU-2026:20499-1","SUSE-SU-2026:20500-1","SUSE-SU-2026:20501-1","SUSE-SU-2026:20502-1","SUSE-SU-2026:20503-1","SUSE-SU-2026:20504-1","SUSE-SU-2026:20505-1","SUSE-SU-2026:20506-1","SUSE-SU-2026:20507-1","SUSE-SU-2026:20508-1","SUSE-SU-2026:20511-1","SUSE-SU-2026:20512-1","SUSE-SU-2026:20513-1","SUSE-SU-2026:20514-1","SUSE-SU-2026:20515-1","SUSE-SU-2026:20516-1","SUSE-SU-2026:20517-1","SUSE-SU-2026:20518-1","SUSE-SU-2026:20635-1","SUSE-SU-2026:20644-1","SUSE-SU-2026:20645-1","openSUSE-SU-2025:20172-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40129.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/6df164e29bd4e6505c5a2e0e5f1e1f6957a16a42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81cec07d303186d0d8c623ef8b5ecd3b81e94cf6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab9a70cd2386a0d70c164b0905dd66bc9af52e77"},{"type":"WEB","url":"https://git.kernel.org/stable/c/affc03d44921f493deaae1d33151e3067a6f9f8f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40129.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40129"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0653028e8f1c97fec30710813a001ad8a2ec34f4"},{"fixed":"81cec07d303186d0d8c623ef8b5ecd3b81e94cf6"},{"fixed":"affc03d44921f493deaae1d33151e3067a6f9f8f"},{"fixed":"ab9a70cd2386a0d70c164b0905dd66bc9af52e77"},{"fixed":"6df164e29bd4e6505c5a2e0e5f1e1f6957a16a42"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40129.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.3.0"},{"fixed":"6.6.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40129.json"}}],"schema_version":"1.7.5"}