A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the
privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:3938 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2026:3939 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2026:3940 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2026:3941 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2026:3942 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2026:5127 | |
| https://access.redhat.com/errata/RHSA-2026:5606 | |
| https://access.redhat.com/security/cve/CVE-2025-12801 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2413081 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2026-03-04 16:16
Updated : 2026-03-25 05:16
NVD link : CVE-2025-12801
Mitre link : CVE-2025-12801
CVE.ORG link : CVE-2025-12801
JSON object : View
Products Affected
redhat
- openshift_container_platform
- enterprise_linux
linux-nfs
- nfs-utils
