Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-71120

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-14 Jan, 2026 | 15:06
Updated At-11 May, 2026 | 21:55
Rejected At-
Credits

SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code unconditionally evaluates page_address(in_token->pages[0]) for the initial memcpy, which can dereference NULL even when the copy length is 0. Guard the first memcpy so it only runs when length > 0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:14 Jan, 2026 | 15:06
Updated At:11 May, 2026 | 21:55
Rejected At:
▼CVE Numbering Authority (CNA)
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code unconditionally evaluates page_address(in_token->pages[0]) for the initial memcpy, which can dereference NULL even when the copy length is 0. Guard the first memcpy so it only runs when length > 0.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/sunrpc/auth_gss/svcauth_gss.c
Default Status
unaffected
Versions
Affected
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before a8f1e445ce3545c90d69c9e8ff8f7821825fe810 (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before 4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before f9e53f69ac3bc4ef568b08d3542edac02e83fefd (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before 7452d53f293379e2c38cfa8ad0694aa46fc4788b (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before a2c6f25ab98b423f99ccd94874d655b8bcb01a19 (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before 1c8bb965e9b0559ff0f5690615a527c30f651dd8 (git)
  • From 5866efa8cbfbadf3905072798e96652faf02dbe8 before d4b69a6186b215d2dc1ebcab965ed88e8d41768d (git)
  • 66ed7b413d31c6ff23901ac4443b1cc1af2f6113 (git)
  • 7be8c165dc81564705e8e0b72d398ef708f67eaa (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/sunrpc/auth_gss/svcauth_gss.c
Default Status
affected
Versions
Affected
  • 5.5
Unaffected
  • From 0 before 5.5 (semver)
  • From 5.10.248 through 5.10.* (semver)
  • From 5.15.198 through 5.15.* (semver)
  • From 6.1.160 through 6.1.* (semver)
  • From 6.6.120 through 6.6.* (semver)
  • From 6.12.64 through 6.12.* (semver)
  • From 6.18.3 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a8f1e445ce3545c90d69c9e8ff8f7821825fe810
N/A
https://git.kernel.org/stable/c/4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d
N/A
https://git.kernel.org/stable/c/f9e53f69ac3bc4ef568b08d3542edac02e83fefd
N/A
https://git.kernel.org/stable/c/7452d53f293379e2c38cfa8ad0694aa46fc4788b
N/A
https://git.kernel.org/stable/c/a2c6f25ab98b423f99ccd94874d655b8bcb01a19
N/A
https://git.kernel.org/stable/c/1c8bb965e9b0559ff0f5690615a527c30f651dd8
N/A
https://git.kernel.org/stable/c/d4b69a6186b215d2dc1ebcab965ed88e8d41768d
N/A
Hyperlink: https://git.kernel.org/stable/c/a8f1e445ce3545c90d69c9e8ff8f7821825fe810
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f9e53f69ac3bc4ef568b08d3542edac02e83fefd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7452d53f293379e2c38cfa8ad0694aa46fc4788b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a2c6f25ab98b423f99ccd94874d655b8bcb01a19
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1c8bb965e9b0559ff0f5690615a527c30f651dd8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d4b69a6186b215d2dc1ebcab965ed88e8d41768d
Resource: N/A
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:14 Jan, 2026 | 15:16
Updated At:25 Mar, 2026 | 18:45

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code unconditionally evaluates page_address(in_token->pages[0]) for the initial memcpy, which can dereference NULL even when the copy length is 0. Guard the first memcpy so it only runs when length > 0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.19.99(inclusive) to 4.20(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.4.15(inclusive) to 5.5(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5.1(inclusive) to 5.10.248(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.198(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.160(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.120(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.12.64(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.13(inclusive) to 6.18.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.5
cpe:2.3:o:linux:linux_kernel:5.5:-:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.19
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-476Primarynvd@nist.gov
CWE ID: CWE-476
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/1c8bb965e9b0559ff0f5690615a527c30f651dd8416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/7452d53f293379e2c38cfa8ad0694aa46fc4788b416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a2c6f25ab98b423f99ccd94874d655b8bcb01a19416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a8f1e445ce3545c90d69c9e8ff8f7821825fe810416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/d4b69a6186b215d2dc1ebcab965ed88e8d41768d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f9e53f69ac3bc4ef568b08d3542edac02e83fefd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/1c8bb965e9b0559ff0f5690615a527c30f651dd8
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/7452d53f293379e2c38cfa8ad0694aa46fc4788b
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a2c6f25ab98b423f99ccd94874d655b8bcb01a19
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a8f1e445ce3545c90d69c9e8ff8f7821825fe810
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/d4b69a6186b215d2dc1ebcab965ed88e8d41768d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f9e53f69ac3bc4ef568b08d3542edac02e83fefd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found