linux-nfs CVE Vulnerabilities & Metrics

Focus on linux-nfs vulnerabilities and metrics.

Last updated: 29 Mar 2026, 22:25 UTC

About linux-nfs Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with linux-nfs. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total linux-nfs CVEs: 2
Earliest CVE date: 18 Aug 2003, 04:00 UTC
Latest CVE date: 04 Mar 2026, 16:16 UTC

Latest CVE reference: CVE-2025-12801

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical linux-nfs CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.67

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 0
7.0-8.9 1
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS linux-nfs CVEs

These are the five CVEs with the highest CVSS scores for linux-nfs, sorted by severity first and recency.

All CVEs for linux-nfs

CVE-2025-12801 linux-nfs vulnerability CVSS: 0 04 Mar 2026, 16:16 UTC

A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.

CVE-2019-3689 linux-nfs vulnerability CVSS: 10.0 19 Sep 2019, 14:15 UTC

The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.

CVE-2011-1749 linux-nfs vulnerability CVSS: 3.3 26 Feb 2014, 15:55 UTC

The nfs_addmntent function in support/nfs/nfs_mntent.c in the mount.nsf tool in nfs-utils before 1.2.4 attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to corrupt this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.

CVE-2011-2500 linux-nfs vulnerability CVSS: 7.5 15 Feb 2014, 14:57 UTC

The host_reliable_addrinfo function in support/export/hostname.c in nfs-utils before 1.2.4 does not properly use DNS to verify access to NFS exports, which allows remote attackers to mount filesystems by establishing crafted DNS A and PTR records.

CVE-2013-1923 linux-nfs vulnerability CVSS: 3.2 21 Jan 2014, 18:55 UTC

rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.

CVE-2003-0252 linux-nfs vulnerability CVSS: 10.0 18 Aug 2003, 04:00 UTC

Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines.