CVE-2024-27020

HIGH

Linux kernel - Data-Race

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() nft_unregister_expr() can concurrent with __nft_expr_type_get(), and there is not any protection when iterate over nf_tables_expressions list in __nft_expr_type_get(). Therefore, there is potential data-race of nf_tables_expressions list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_expressions list in __nft_expr_type_get(), and use rcu_read_lock() in the caller nft_expr_type_get() to protect the entire type query process.

Scores

CVSS v3 7.0
EPSS 0.0001
EPSS Percentile 1.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-362
Status published

Affected Products (12)

linux/linux_kernel < 4.19.313
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/Kernel < 4.19.313linux
linux/Kernel < 5.4.275linux
linux/Kernel < 5.10.216linux
linux/Kernel < 5.15.157linux
linux/Kernel < 6.1.88linux
linux/Kernel < 6.6.29linux
linux/Kernel < 6.8.8linux

Timeline

Published May 01, 2024
Tracked Since Feb 18, 2026