High severity7.8NVD Advisory· Published Sep 8, 2010· Updated Apr 29, 2026
CVE-2010-2798
CVE-2010-2798
Description
The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
Affected products
36- cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_presence_services:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_presence_services:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_presence_services:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_session_manager:6.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_manager:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_platform:6.0:-:*:*:*:*:*:*
- cpe:2.3:a:avaya:aura_system_platform:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:voice_portal:5.1:-:*:*:*:*:*:*
- cpe:2.3:a:avaya:voice_portal:5.1:sp1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*+ 5 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- www.openwall.com/lists/oss-security/2010/08/02/1nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2010/08/02/10nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-11/msg00000.htmlnvdMailing ListThird Party Advisory
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- support.avaya.com/css/P8/documents/100113326nvdThird Party Advisory
- www.debian.org/security/2010/dsa-2094nvdThird Party Advisory
- www.securityfocus.com/archive/1/520102/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/42124nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1000-1nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2011-0012.htmlnvdThird Party Advisory
- secunia.com/advisories/46397nvdBroken Link
- www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0660.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0670.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0723.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.