In the Linux kernel, the following vulnerability has been resolved:
ceph: pass cred pointer to ceph_mds_auth_match()
This eliminates a redundant get_current_cred() call, because
ceph_mds_check_access() has already obtained this pointer.
As a side effect, this also fixes a reference leak in
ceph_mds_auth_match(): by omitting the get_current_cred() call, no
additional cred reference is taken.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Dec 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 27 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ceph: pass cred pointer to ceph_mds_auth_match() This eliminates a redundant get_current_cred() call, because ceph_mds_check_access() has already obtained this pointer. As a side effect, this also fixes a reference leak in ceph_mds_auth_match(): by omitting the get_current_cred() call, no additional cred reference is taken. | |
Title | ceph: pass cred pointer to ceph_mds_auth_match() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-12-27T14:23:08.563Z
Updated: 2025-05-04T09:58:27.735Z
Reserved: 2024-12-27T14:03:05.995Z
Link: CVE-2024-56564

No data.

Status : Received
Published: 2024-12-27T15:15:15.297
Modified: 2024-12-27T15:15:15.297
Link: CVE-2024-56564
