We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56564

ceph: pass cred pointer to ceph_mds_auth_match()



Description

In the Linux kernel, the following vulnerability has been resolved: ceph: pass cred pointer to ceph_mds_auth_match() This eliminates a redundant get_current_cred() call, because ceph_mds_check_access() has already obtained this pointer. As a side effect, this also fixes a reference leak in ceph_mds_auth_match(): by omitting the get_current_cred() call, no additional cred reference is taken.

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2024-12-27 | Assigner Linux

Product status

Default status
unaffected

596afb0b8933ba6ed7227adcc538db26feb25c74 before ffa6ba7bdb7f07f49c9e9150b0176df066520f62
affected

596afb0b8933ba6ed7227adcc538db26feb25c74 before 23426309a4064b25a961e1c72961d8bfc7c8c990
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.4
unaffected

6.13-rc1
unaffected

References

git.kernel.org/...c/ffa6ba7bdb7f07f49c9e9150b0176df066520f62

git.kernel.org/...c/23426309a4064b25a961e1c72961d8bfc7c8c990

cve.org (CVE-2024-56564)

nvd.nist.gov (CVE-2024-56564)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56564

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.