Описание
ELSA-2026-3938: nfs-utils security update (MODERATE)
[2.3.3-68.0.1]
- nfsd: allow more than 64 backlogged connections
- spec: remove multiple warnings when upgrading nfs-utils with gssproxy [Orabug: 35173372]
[2.3.3-68]
- Add requires for selinux-policy (RHEL-127095)
[2.3.3-67]
- mountd: Minor refactor of get_rootfh() (RHEL-127095)
- mountd: Separate lookup of the exported directory and the mount path (RHEL-127095)
- support: Add a mini-library to extract and apply RPC credentials (RHEL-127095)
- Fix access checks when mounting subdirectories in NFSv3 (RHEL-127095) Resolves: CVE-2025-12801
[2.3.3-66]
- gssd: protect kerberos ticket cache access (RHEL-103627)
[2.3.3-65]
- nfsrahead: modify get_device_info logic (RHEL-108924)
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
libnfsidmap
2.3.3-68.0.1.el8_10
libnfsidmap-devel
2.3.3-68.0.1.el8_10
nfs-utils
2.3.3-68.0.1.el8_10
Oracle Linux x86_64
libnfsidmap
2.3.3-68.0.1.el8_10
libnfsidmap-devel
2.3.3-68.0.1.el8_10
nfs-utils
2.3.3-68.0.1.el8_10
Связанные CVE
Связанные уязвимости
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
A vulnerability was recently discovered in the rpc.mountd daemon in th ...