In the Linux kernel, the following vulnerability has been resolved:
ceph: properly put ceph_string reference after async create attempt
The reference acquired by try_prep_async_create is currently leaked.
Ensure we put it.
References
Configurations
Configuration 1 (hide)
|
History
29 Sep 2025, 18:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18 - Patch | |
| References | () https://git.kernel.org/stable/c/932a9b5870d38b87ba0a9923c804b1af7d3605b9 - Patch | |
| References | () https://git.kernel.org/stable/c/a0c22e970cd78b81c94691e6cb09713e8074d580 - Patch | |
| References | () https://git.kernel.org/stable/c/e7be12ca7d3947765b0d7c1c7e0537e748da993a - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo |
21 Nov 2024, 07:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18 - | |
| References | () https://git.kernel.org/stable/c/932a9b5870d38b87ba0a9923c804b1af7d3605b9 - | |
| References | () https://git.kernel.org/stable/c/a0c22e970cd78b81c94691e6cb09713e8074d580 - | |
| References | () https://git.kernel.org/stable/c/e7be12ca7d3947765b0d7c1c7e0537e748da993a - |
30 Oct 2024, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
20 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2025-09-29 18:35
NVD link : CVE-2022-48767
Mitre link : CVE-2022-48767
CVE.ORG link : CVE-2022-48767
JSON object : View
Products Affected
linux
- linux_kernel
CWE
