We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-48767

ceph: properly put ceph_string reference after async create attempt



Description

In the Linux kernel, the following vulnerability has been resolved: ceph: properly put ceph_string reference after async create attempt The reference acquired by try_prep_async_create is currently leaked. Ensure we put it.

Reserved 2024-06-20 | Published 2024-06-20 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6 before e7be12ca7d3947765b0d7c1c7e0537e748da993a
affected

9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6 before 36d433ae3242aa714176378850e6d1a5a3e78f18
affected

9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6 before a0c22e970cd78b81c94691e6cb09713e8074d580
affected

9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6 before 932a9b5870d38b87ba0a9923c804b1af7d3605b9
affected

Default status
affected

5.7
affected

Any version before 5.7
unaffected

5.10.96
unaffected

5.15.19
unaffected

5.16.5
unaffected

5.17
unaffected

References

git.kernel.org/...c/e7be12ca7d3947765b0d7c1c7e0537e748da993a

git.kernel.org/...c/36d433ae3242aa714176378850e6d1a5a3e78f18

git.kernel.org/...c/a0c22e970cd78b81c94691e6cb09713e8074d580

git.kernel.org/...c/932a9b5870d38b87ba0a9923c804b1af7d3605b9

cve.org (CVE-2022-48767)

nvd.nist.gov (CVE-2022-48767)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-48767

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.