V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2010-2798
DEB
HighConfirmedExploit available

The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associa…

CVSS
7.8
High
EPSS
0.00
p15
Published
2010-01-01
Updated
2010-01-01
Description

The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.

Tags · CWE
CWE-476
CWE-682
CAPEC-128
CAPEC-129
Affected products
Aura_communication_managerAura_presence_servicesAura_session_managerAura_system_managerAura_system_platformIqVoice_portal
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Timeline
2010-01-01
Published
2010-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.001 · p15
Known exploited (KEV)
No
Known exploits — Сканер-ВС
15024
exploitdb · https://www.exploit-db.com/exploits/15024
Enterprise
15150
exploitdb · https://www.exploit-db.com/exploits/15150
Enterprise
15622
exploitdb · https://www.exploit-db.com/exploits/15622
Enterprise
17787
exploitdb · https://www.exploit-db.com/exploits/17787
Enterprise
34987
exploitdb · https://www.exploit-db.com/exploits/34987
Enterprise
Affected software
ProductVendorStatus
kernelTracked
kernelTracked
kernelTracked
linuxTracked
linux-2.6Tracked
aura_communication_manager*Tracked
aura_presence_services*Tracked
aura_session_manager*Tracked
aura_system_manager*Tracked
aura_system_platform*Tracked
debian_linux*Tracked
esx*Tracked
iq*Tracked
linux_enterprise_high_availability_extension*Tracked
linux_kernel*Tracked
opensuse*Tracked
suse_linux_enterprise_desktop*Tracked
suse_linux_enterprise_server*Tracked
ubuntu_linux*Tracked
voice_portal*Tracked
Source databases
DEB
CVE
RED
UBU
Related vulnerabilities