First published: Wed Jan 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level cgroup maximum depth is INT_MAX by default, there is a cgroup toggle to restrict this maximum depth to a more reasonable value not to harm performance. Remove unnecessary WARN_ON_ONCE which is reachable from userspace.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.1.112<6.1.120 | |
Linux Kernel | >=6.6.53<6.6.66 | |
Linux Kernel | >=6.10.12<6.12.5 | |
Linux Kernel | =6.13-rc1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56783 is categorized as moderate.
To fix CVE-2024-56783, you should update the Linux kernel to a version that includes the patch for this vulnerability.
CVE-2024-56783 affects various versions of the Linux kernel, specifically between versions 6.1.112 to 6.1.120, 6.6.53 to 6.6.66, and 6.10.12 to 6.12.5.
CVE-2024-56783 is not primarily a remote vulnerability as it relates to the Linux kernel's handling of cgroups.
Yes, CVE-2024-56783 may pose risks in multi-tenant environments where cgroup configurations are not properly managed.