Unknown
CVE-2010-2798
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2010-2798
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- aura communication manager 5.2,
- aura presence services 6.0,
- aura presence services 6.1,
- aura presence services 6.1.1,
- aura session manager 1.1,
- aura session manager 5.2,
- aura session manager 6.0,
- aura system manager 5.2,
- aura system manager 6.0,
- aura system manager 6.1,
- aura system manager 6.1.1,
- aura system platform 1.1,
- aura system platform 6.0,
- debian linux 5.0,
- esx 4.0,
- esx 4.1,
- iq 5.0,
- iq 5.1,
- linux enterprise high availability extension 11,
- linux kernel,
- opensuse 11.1,
- suse linux enterprise desktop 11,
- suse linux enterprise server 11,
- ubuntu linux 10.04,
- ubuntu linux 10.10,
- ubuntu linux 6.06,
- ubuntu linux 8.04,
- ubuntu linux 9.04,
- ubuntu linux 9.10,
- voice portal 5.0,
- voice portal 5.1
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: