In the Linux kernel, the following vulnerability has been resolved:
ceph: pass cred pointer to cephmdsauth_match()
This eliminates a redundant getcurrentcred() call, because cephmdscheck_access() has already obtained this pointer.
As a side effect, this also fixes a reference leak in cephmdsauthmatch(): by omitting the getcurrent_cred() call, no additional cred reference is taken.
[
{
"target": {
"file": "fs/ceph/mds_client.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"303825472152072975052765184374589323707",
"264036595712456916845936721961270447950",
"195147909502675063683018274836995138272",
"215915376874330709953908055971052674912",
"28452907851316706202590797952533039198",
"211438033142896327389006015315257146401",
"107583560763181239944092586862484159109",
"278069708755110099605604463471194823896",
"112260057685538818564568550208853301357",
"143875911876472016493189724875202530134",
"337275561728197601034779941734351022710"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
"deprecated": false,
"id": "CVE-2024-56564-2fe94ee8",
"signature_type": "Line"
},
{
"target": {
"function": "ceph_mds_check_access",
"file": "fs/ceph/mds_client.c"
},
"signature_version": "v1",
"digest": {
"length": 1396.0,
"function_hash": "301563397482155029465552984608906452400"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
"deprecated": false,
"id": "CVE-2024-56564-42dc7fb6",
"signature_type": "Function"
},
{
"target": {
"function": "ceph_mds_auth_match",
"file": "fs/ceph/mds_client.c"
},
"signature_version": "v1",
"digest": {
"length": 1981.0,
"function_hash": "60065011174291788561029616095999232761"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ffa6ba7bdb7f07f49c9e9150b0176df066520f62",
"deprecated": false,
"id": "CVE-2024-56564-7cb5940b",
"signature_type": "Function"
}
]