In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix potential data-race in _nftflowtabletypeget()
nftunregisterflowtabletype() within nfflowinetmodule_exit() can concurrent with __nftflowtabletypeget() within nftablesnewflowtable(). And thhere is not any protection when iterate over nftables_flowtables list in _nftflowtabletypeget(). Therefore, there is pertential data-race of nftablesflowtables list entry.
Use listforeachentryrcu() to iterate over nftablesflowtables list in __nftflowtabletypeget(), and use rcureadlock() in the caller nftflowtabletypeget() to protect the entire type query process.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35898.json",
"cna_assigner": "Linux"
}