{"id":"CVE-2024-27020","summary":"netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()\n\nnft_unregister_expr() can concurrent with __nft_expr_type_get(),\nand there is not any protection when iterate over nf_tables_expressions\nlist in __nft_expr_type_get(). Therefore, there is potential data-race\nof nf_tables_expressions list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_expressions\nlist in __nft_expr_type_get(), and use rcu_read_lock() in the caller\nnft_expr_type_get() to protect the entire type query process.","modified":"2026-04-02T10:06:48.187279Z","published":"2024-05-01T05:30:15.908Z","related":["ALSA-2024:5928","MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2802-1","SUSE-SU-2024:2892-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2940-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27020.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05"},{"type":"WEB","url":"https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27020.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27020"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ef1f7df9170dbd875ce198ba84e6ab80f6fc139e"},{"fixed":"939109c0a8e2a006a6cc8209e262d25065f4403a"},{"fixed":"b38a133d37fa421c8447b383d788c9cc6f5cb34c"},{"fixed":"934e66e231cff2b18faa2c8aad0b8cec13957e05"},{"fixed":"0b6de00206adbbfc6373b3ae38d2a6f197987907"},{"fixed":"8d56bad42ac4c43c6c72ddd6a654a2628bf839c5"},{"fixed":"a9ebf340d123ae12582210407f879d6a5a1bc25b"},{"fixed":"01f1a678b05ade4b1248019c2dcca773aebbeb7f"},{"fixed":"f969eb84ce482331a991079ab7a5c4dc3b7f89bf"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27020.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}