vulnerability

Ubuntu: (Multiple Advisories) (CVE-2021-3178): Linux kernel vulnerabilities

Severity
6
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
Jan 19, 2021
Added
Mar 17, 2021
Modified
Nov 8, 2023

Description

fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior

Solution(s)

ubuntu-upgrade-linux-image-4-15-0-1013-dell300xubuntu-upgrade-linux-image-4-15-0-1066-oracleubuntu-upgrade-linux-image-4-15-0-1080-raspi2ubuntu-upgrade-linux-image-4-15-0-1086-kvmubuntu-upgrade-linux-image-4-15-0-1094-gcpubuntu-upgrade-linux-image-4-15-0-1095-awsubuntu-upgrade-linux-image-4-15-0-1097-snapdragonubuntu-upgrade-linux-image-4-15-0-1109-azureubuntu-upgrade-linux-image-4-15-0-137-genericubuntu-upgrade-linux-image-4-15-0-137-generic-lpaeubuntu-upgrade-linux-image-4-15-0-137-lowlatencyubuntu-upgrade-linux-image-4-4-0-1087-awsubuntu-upgrade-linux-image-4-4-0-1089-kvmubuntu-upgrade-linux-image-4-4-0-1123-awsubuntu-upgrade-linux-image-4-4-0-1147-raspi2ubuntu-upgrade-linux-image-4-4-0-1151-snapdragonubuntu-upgrade-linux-image-4-4-0-204-genericubuntu-upgrade-linux-image-4-4-0-204-generic-lpaeubuntu-upgrade-linux-image-4-4-0-204-lowlatencyubuntu-upgrade-linux-image-4-4-0-204-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-204-powerpc-smpubuntu-upgrade-linux-image-4-4-0-204-powerpc64-embubuntu-upgrade-linux-image-4-4-0-204-powerpc64-smpubuntu-upgrade-linux-image-5-4-0-1011-gkeopubuntu-upgrade-linux-image-5-4-0-1030-raspiubuntu-upgrade-linux-image-5-4-0-1034-kvmubuntu-upgrade-linux-image-5-4-0-1037-gkeubuntu-upgrade-linux-image-5-4-0-1038-gcpubuntu-upgrade-linux-image-5-4-0-1039-awsubuntu-upgrade-linux-image-5-4-0-1039-oracleubuntu-upgrade-linux-image-5-4-0-1041-azureubuntu-upgrade-linux-image-5-4-0-67-genericubuntu-upgrade-linux-image-5-4-0-67-generic-lpaeubuntu-upgrade-linux-image-5-4-0-67-lowlatencyubuntu-upgrade-linux-image-5-6-0-1053-oemubuntu-upgrade-linux-image-5-8-0-1020-raspiubuntu-upgrade-linux-image-5-8-0-1020-raspi-nolpaeubuntu-upgrade-linux-image-5-8-0-1023-kvmubuntu-upgrade-linux-image-5-8-0-1025-oracleubuntu-upgrade-linux-image-5-8-0-1027-azureubuntu-upgrade-linux-image-5-8-0-1027-gcpubuntu-upgrade-linux-image-5-8-0-1028-awsubuntu-upgrade-linux-image-5-8-0-49-genericubuntu-upgrade-linux-image-5-8-0-49-generic-64kubuntu-upgrade-linux-image-5-8-0-49-generic-lpaeubuntu-upgrade-linux-image-5-8-0-49-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-edgeubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-edgeubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-lts-xenial
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.