Home

Description

In the Linux kernel, the following vulnerability has been resolved: ceph: pass cred pointer to ceph_mds_auth_match() This eliminates a redundant get_current_cred() call, because ceph_mds_check_access() has already obtained this pointer. As a side effect, this also fixes a reference leak in ceph_mds_auth_match(): by omitting the get_current_cred() call, no additional cred reference is taken.

PUBLISHED Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

596afb0b8933ba6ed7227adcc538db26feb25c74 (git) before ffa6ba7bdb7f07f49c9e9150b0176df066520f62
affected

596afb0b8933ba6ed7227adcc538db26feb25c74 (git) before 23426309a4064b25a961e1c72961d8bfc7c8c990
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.4 (semver)
unaffected

6.13 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ffa6ba7bdb7f07f49c9e9150b0176df066520f62

git.kernel.org/...c/23426309a4064b25a961e1c72961d8bfc7c8c990

cve.org (CVE-2024-56564)

nvd.nist.gov (CVE-2024-56564)

Download JSON