Linux Kernel SUNRPC NULL deref via zero-length gss_token (CVE-2025-71120)
CVE-2025-71120 Published on January 14, 2026
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
A zero length gss_token results in pages == 0 and in_token->pages[0]
is NULL. The code unconditionally evaluates
page_address(in_token->pages[0]) for the initial memcpy, which can
dereference NULL even when the copy length is 0. Guard the first
memcpy so it only runs when length > 0.
Products Associated with CVE-2025-71120
stack.watch emails you whenever new vulnerabilities are published in Linux Kernel or Canonical Ubuntu Linux. Just hit a watch button to start following.
Affected Versions
Linux:- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below a8f1e445ce3545c90d69c9e8ff8f7821825fe810 is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below 4dedb6a11243a5c9eb9dbb97bca3c98bd725e83d is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below f9e53f69ac3bc4ef568b08d3542edac02e83fefd is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below 7452d53f293379e2c38cfa8ad0694aa46fc4788b is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below a2c6f25ab98b423f99ccd94874d655b8bcb01a19 is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below 1c8bb965e9b0559ff0f5690615a527c30f651dd8 is affected.
- Version 5866efa8cbfbadf3905072798e96652faf02dbe8 and below d4b69a6186b215d2dc1ebcab965ed88e8d41768d is affected.
- Version 66ed7b413d31c6ff23901ac4443b1cc1af2f6113 is affected.
- Version 7be8c165dc81564705e8e0b72d398ef708f67eaa is affected.
- Version 5.5 is affected.
- Before 5.5 is unaffected.
- Version 5.10.248, <= 5.10.* is unaffected.
- Version 5.15.198, <= 5.15.* is unaffected.
- Version 6.1.160, <= 6.1.* is unaffected.
- Version 6.6.120, <= 6.6.* is unaffected.
- Version 6.12.64, <= 6.12.* is unaffected.
- Version 6.18.3, <= 6.18.* is unaffected.
- Version 6.19, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.