{"api_version":"1","generated_at":"2026-05-13T15:45:26+00:00","cve":"CVE-2010-2526","urls":{"html":"https://cve.report/CVE-2010-2526","api":"https://cve.report/api/cve/CVE-2010-2526.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2010-2526","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2010-2526"},"summary":{"title":"CVE-2010-2526","description":"The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands.","state":"PUBLISHED","assigner":"redhat","published_at":"2010-08-05 13:22:29","updated_at":"2026-04-29 01:13:23"},"problem_types":["CWE-287","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.6","severity":"","vector":"AV:L/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614248","name":"https://bugzilla.redhat.com/show_bug.cgi?id=614248","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Bug 614248 – CVE-2010-2526 lvm2-cluster: insecurity when communicating between lvm2 and clvmd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/66753","name":"http://www.osvdb.org/66753","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.ubuntu.com/usn/USN-1001-1","name":"http://www.ubuntu.com/usn/USN-1001-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-1001-1: LVM2 vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0567.html","name":"https://rhn.redhat.com/errata/RHSA-2010-0567.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"access.redhat.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","name":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[security-announce] SUSE Security Summary Report: SUSE-SR:2010:017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0568.html","name":"https://rhn.redhat.com/errata/RHSA-2010-0568.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"access.redhat.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1024258","name":"http://securitytracker.com/id?1024258","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - LVM2 Missing Authentication in Cluster Local Volume Manager Lets Local Users Manage Volumes in the Cluster","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2010/1944","name":"http://www.vupen.com/english/advisories/2010/1944","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html","name":"https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[linux-lvm] lvm2-cluster (clvmd) security fix (Moderate)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60809","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60809","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/40759","name":"http://secunia.com/advisories/40759","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"LVM2 Abstract Socket Security Issue - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2010-2526","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2526","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.50","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.51","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.52","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.53","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.54","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.55","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.56","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.57","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.58","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.59","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.60","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.61","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.62","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.63","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.64","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.65","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.66","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.67","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.68","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.69","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"2.02.70","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"1","versionEndIncluding":"2.02.71","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"heinz_mauelshagen","cpe5":"lvm2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"cluster_suite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2526","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"advanced_platform","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T02:39:37.255Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"USN-1001-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1001-1"},{"name":"[linux-lvm] 20100728 lvm2-cluster (clvmd) security fix (Moderate)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html"},{"name":"40759","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/40759"},{"name":"lvm2-socket-privilege-escalation(60809)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60809"},{"name":"RHSA-2010:0568","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0568.html"},{"name":"RHSA-2010:0567","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0567.html"},{"name":"1024258","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1024258"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614248"},{"name":"SUSE-SR:2010:017","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"name":"66753","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/66753"},{"name":"ADV-2010-1944","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2010/1944"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2010-07-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-16T14:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"USN-1001-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-1001-1"},{"name":"[linux-lvm] 20100728 lvm2-cluster (clvmd) security fix (Moderate)","tags":["mailing-list","x_refsource_MLIST"],"url":"https://www.redhat.com/archives/linux-lvm/2010-July/msg00083.html"},{"name":"40759","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/40759"},{"name":"lvm2-socket-privilege-escalation(60809)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60809"},{"name":"RHSA-2010:0568","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0568.html"},{"name":"RHSA-2010:0567","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://rhn.redhat.com/errata/RHSA-2010-0567.html"},{"name":"1024258","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1024258"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614248"},{"name":"SUSE-SR:2010:017","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"name":"66753","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/66753"},{"name":"ADV-2010-1944","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2010/1944"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2010-2526","datePublished":"2010-08-04T21:00:00.000Z","dateReserved":"2010-06-30T00:00:00.000Z","dateUpdated":"2024-08-07T02:39:37.255Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2010-08-05 13:22:29","lastModifiedDate":"2026-04-29 01:13:23","problem_types":["CWE-287","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:*:*:*:*:*:*:*:*","versionEndIncluding":"2.02.71","matchCriteriaId":"DAAD83C6-111A-4FF6-A5BD-AC16C1F32CE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.50:*:*:*:*:*:*:*","matchCriteriaId":"B53A8581-7345-426F-AA04-D014416BA388"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.51:*:*:*:*:*:*:*","matchCriteriaId":"7F564759-54C4-4B21-B776-1F42AC1E79BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.52:*:*:*:*:*:*:*","matchCriteriaId":"AFA7C87A-3938-419D-A906-111B76471284"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.53:*:*:*:*:*:*:*","matchCriteriaId":"88306324-0A7C-40E1-9641-E4B2C5BE3D10"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.54:*:*:*:*:*:*:*","matchCriteriaId":"701C04CB-E29B-438A-A05E-7CE1C4D5FE39"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.55:*:*:*:*:*:*:*","matchCriteriaId":"910DD64E-8E7D-4663-939E-CF27A00B421D"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.56:*:*:*:*:*:*:*","matchCriteriaId":"4C0AA5BC-0845-4380-A605-E271AB62ADCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.57:*:*:*:*:*:*:*","matchCriteriaId":"252CB860-882D-43C7-B9B2-A8C6AE3C2441"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.58:*:*:*:*:*:*:*","matchCriteriaId":"3AAB177B-3E30-4B17-9C69-E9B21D656419"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.59:*:*:*:*:*:*:*","matchCriteriaId":"5181CD32-3A03-4E96-A9F9-1162E57C6E34"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.60:*:*:*:*:*:*:*","matchCriteriaId":"C0766B1F-6F9D-42C1-9A81-0CEAF6C16847"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.61:*:*:*:*:*:*:*","matchCriteriaId":"B247094E-6D73-4A39-9F3B-10ED732EB19D"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.62:*:*:*:*:*:*:*","matchCriteriaId":"3A9EB88E-BA69-47FF-8DBE-5D7F6D4685B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.63:*:*:*:*:*:*:*","matchCriteriaId":"8FE75832-B904-4E47-A228-385F40F69883"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.64:*:*:*:*:*:*:*","matchCriteriaId":"08388E9B-52C3-444A-931F-9F578BFDE149"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.65:*:*:*:*:*:*:*","matchCriteriaId":"09F666A4-52E5-44E3-A089-D001FE2B83CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.66:*:*:*:*:*:*:*","matchCriteriaId":"4B5E4CA4-1524-444C-B6A5-1D690246382D"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.67:*:*:*:*:*:*:*","matchCriteriaId":"F29896B5-2471-400E-A248-4FE19BCF307E"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.68:*:*:*:*:*:*:*","matchCriteriaId":"D4A89B61-3CC5-4079-8DC9-6544A7FA6860"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.69:*:*:*:*:*:*:*","matchCriteriaId":"477CA6D5-A62A-48FE-8A1C-0B87C65100D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:heinz_mauelshagen:lvm2:2.02.70:*:*:*:*:*:*:*","matchCriteriaId":"57BCDFF2-FE3E-4F40-AB08-6FA4046D28E8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:redhat:cluster_suite:*:*:*:*:*:*:*:*","matchCriteriaId":"34EEC6AA-4B41-4C17-95A9-07D3F7305985"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*","matchCriteriaId":"444EBE64-D3C8-41E9-8E02-22C6BDA2876B"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*","matchCriteriaId":"CA2C244C-82F6-49BC-B7F7-54AB989C43E8"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6172AF57-B26D-45F8-BE3A-F75ABDF28F49"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:5:*:advanced_platform:*:*:*:*:*","matchCriteriaId":"8A3C8EE7-9735-4C34-9A8E-0990A917CBA7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2010","CveId":"2526","Ordinal":"1","Title":"CVE-2010-2526","CVE":"CVE-2010-2526","Year":"2010"},"notes":[{"CveYear":"2010","CveId":"2526","Ordinal":"1","NoteData":"The cluster logical volume manager daemon (clvmd) in lvm2-cluster in LVM2 before 2.02.72, as used in Red Hat Global File System (GFS) and other products, does not verify client credentials upon a socket connection, which allows local users to cause a denial of service (daemon exit or logical-volume change) or possibly have unspecified other impact via crafted control commands.","Type":"Description","Title":"CVE-2010-2526"},{"CveYear":"2010","CveId":"2526","Ordinal":"2","NoteData":"2010-08-04","Type":"Other","Title":"Published"},{"CveYear":"2010","CveId":"2526","Ordinal":"3","NoteData":"2017-08-16","Type":"Other","Title":"Modified"}]}}}