Updated: 2026-02-27 02:02:36.19075
Description:
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() nft_unregister_expr() can concurrent with __nft_expr_type_get(), and there is not any protection when iterate over nf_tables_expressions list in __nft_expr_type_get(). Therefore, there is potential data-race of nf_tables_expressions list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_expressions list in __nft_expr_type_get(), and use rcu_read_lock() in the caller nft_expr_type_get() to protect the entire type query process.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.0 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | kernel | 3.10.0 | 7.0 | HIGH | Released | CLSA-2025:1750353839 | 2025-06-20 00:27:37 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.0 | HIGH | Released | CLSA-2024:1716980592 | 2024-05-29 10:08:05 | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.0 | HIGH | Released | CLSA-2024:1716980150 | 2024-05-29 10:07:49 | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 7.0 | HIGH | Released | CLSA-2024:1716981167 | 2024-05-29 10:07:50 |