In the Linux kernel, the following vulnerability has been resolved:
ceph: pass cred pointer to ceph_mds_auth_match()
This eliminates a redundant get_current_cred() call, because
ceph_mds_check_access() has already obtained this pointer.
As a side effect, this also fixes a reference leak in
ceph_mds_auth_match(): by omitting the get_current_cred() call, no
additional cred reference is taken.
References
Configurations
History
07 Oct 2025, 18:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/23426309a4064b25a961e1c72961d8bfc7c8c990 - Patch | |
References | () https://git.kernel.org/stable/c/ffa6ba7bdb7f07f49c9e9150b0176df066520f62 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
27 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 15:15
Updated : 2025-10-07 18:45
NVD link : CVE-2024-56564
Mitre link : CVE-2024-56564
CVE.ORG link : CVE-2024-56564
JSON object : View
Products Affected
linux
- linux_kernel
CWE