HomeDefault status
unaffected
90c9550a8d65fb9b1bf87baf97a04ed91bf61b33 (git) before b8fa37219074811c04d4ecb742c73e2b296da6a8
affected
90c9550a8d65fb9b1bf87baf97a04ed91bf61b33 (git) before fb2cba0854a7f315c8100a807a6959b99d72479e
affected
Default status
affected
6.17
affected
Any version before 6.17
unaffected
6.17.9 (semver)
unaffected
6.18 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: NFS: Check the TLS certificate fields in nfs_match_client() If the TLS security policy is of type RPC_XPRTSEC_TLS_X509, then the cert_serial and privkey_serial fields need to match as well since they define the client's identity, as presented to the server.
Product status
90c9550a8d65fb9b1bf87baf97a04ed91bf61b33 (git) before b8fa37219074811c04d4ecb742c73e2b296da6a8
90c9550a8d65fb9b1bf87baf97a04ed91bf61b33 (git) before fb2cba0854a7f315c8100a807a6959b99d72479e
6.17
Any version before 6.17
6.17.9 (semver)
6.18 (original_commit_for_fix)
References
git.kernel.org/...c/b8fa37219074811c04d4ecb742c73e2b296da6a8
git.kernel.org/...c/fb2cba0854a7f315c8100a807a6959b99d72479e
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.