In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
nft_unregister_expr() can concurrent with __nft_expr_type_get(),
and there is not any protection when iterate over nf_tables_expressions
list in __nft_expr_type_get(). Therefore, there is potential data-race
of nf_tables_expressions list entry.
Use list_for_each_entry_rcu() to iterate over nf_tables_expressions
list in __nft_expr_type_get(), and use rcu_read_lock() in the caller
nft_expr_type_get() to protect the entire type query process.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f - Patch | |
References | () https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907 - Patch | |
References | () https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5 - Patch | |
References | () https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05 - Patch | |
References | () https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a - Patch | |
References | () https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b - Patch | |
References | () https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c - Patch | |
References | () https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf - Patch |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 May 2024, 19:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-362 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f - Patch | |
References | () https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907 - Patch | |
References | () https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5 - Patch | |
References | () https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05 - Patch | |
References | () https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a - Patch | |
References | () https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b - Patch | |
References | () https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c - Patch | |
References | () https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf - Patch |
03 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
03 May 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
01 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 06:15
Updated : 2024-11-21 09:03
NVD link : CVE-2024-27020
Mitre link : CVE-2024-27020
CVE.ORG link : CVE-2024-27020
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')