In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nftflowtabletypeget() nftunregisterflowtabletype() within nfflowinetmoduleexit() can concurrent with __nftflowtabletype_get() within nftablesnewflowtable(). And thhere is not any protection when iterate over nftablesflowtables list in __nftflowtabletype_get(). Therefore, there is pertential data-race of nftablesflowtables list entry. Use listforeachentryrcu() to iterate over nftablesflowtables list in __nftflowtabletypeget(), and use rcureadlock() in the caller nftflowtabletypeget() to protect the entire type query process.