CVE-2024-56564

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56564
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56564.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-56564
Downstream
Related
Published
2024-12-27T14:23:08.563Z
Modified
2025-11-20T07:03:31.737951Z
Summary
ceph: pass cred pointer to ceph_mds_auth_match()
Details

In the Linux kernel, the following vulnerability has been resolved:

ceph: pass cred pointer to cephmdsauth_match()

This eliminates a redundant getcurrentcred() call, because cephmdscheck_access() has already obtained this pointer.

As a side effect, this also fixes a reference leak in cephmdsauthmatch(): by omitting the getcurrent_cred() call, no additional cred reference is taken.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
596afb0b8933ba6ed7227adcc538db26feb25c74
Fixed
ffa6ba7bdb7f07f49c9e9150b0176df066520f62
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
596afb0b8933ba6ed7227adcc538db26feb25c74
Fixed
23426309a4064b25a961e1c72961d8bfc7c8c990

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.2
v6.12.3

Database specific

vanir_signatures

[
    {
        "target": {
            "file": "fs/ceph/mds_client.c"
        },
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "303825472152072975052765184374589323707",
                "264036595712456916845936721961270447950",
                "195147909502675063683018274836995138272",
                "215915376874330709953908055971052674912",
                "28452907851316706202590797952533039198",
                "211438033142896327389006015315257146401",
                "107583560763181239944092586862484159109",
                "278069708755110099605604463471194823896",
                "112260057685538818564568550208853301357",
                "143875911876472016493189724875202530134",
                "337275561728197601034779941734351022710"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
        "deprecated": false,
        "id": "CVE-2024-56564-2fe94ee8",
        "signature_type": "Line"
    },
    {
        "target": {
            "function": "ceph_mds_check_access",
            "file": "fs/ceph/mds_client.c"
        },
        "signature_version": "v1",
        "digest": {
            "length": 1396.0,
            "function_hash": "301563397482155029465552984608906452400"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
        "deprecated": false,
        "id": "CVE-2024-56564-42dc7fb6",
        "signature_type": "Function"
    },
    {
        "target": {
            "function": "ceph_mds_auth_match",
            "file": "fs/ceph/mds_client.c"
        },
        "signature_version": "v1",
        "digest": {
            "length": 1981.0,
            "function_hash": "60065011174291788561029616095999232761"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
        "deprecated": false,
        "id": "CVE-2024-56564-7cb5940b",
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.12.4