CVE-2024-36971
ENISA EUVD: EUVD-2024-36321 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
2 articles
Published: 2024-06-10
EPSS Score
Source: FIRST.org · 2026-05-23
0.44%
probability
This CVE has a 0.44% probability
of being exploited in the next 30 days.
0%
Top 63.4th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)In the Linux kernel, the following vulnerability has been resolved:
net: fix __dst_negative_advice() race
__dst_negative_advice() does not enforce proper RCU rules when
sk->dst_cache must be cleared, leading to possible UAF.
RCU rules are that we must first clear sk->sk_dst_cache,
then call dst_release(old_dst).
Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.
Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three ->negative_advice()
existing methods must perform the sk_dst_reset() themselves.
Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.
Many thanks to Clement Lecigne for tracking this issue.
This old bug became visible after the blamed commit, using UDP sockets.
Affected Products
Linux
Linux
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
Linux
Linux
4.6
0
4.19.316
5.4.278
5.10.219
5.15.161
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
Aug. 5, 2024
Reported by
Clément Lecigne of Google's Threat Analysis Group
Root Cause Analysis
???
Exploits & PoC
Kronk-imp/CVE-2024-36971
Poc for CVE-2024-36971
1
2026-04-14
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
82%
EPSS
0.44%
CVSS v3.1
7.8
Mentions
2
Last Seen
Aug 05, 2024
CNA Information
CNA Assigner
Linux
CNA Title
net: fix __dst_negative_advice() race
Analyst Note
This CVE is confirmed as a legitimate use-after-free vulnerability in the Linux kernel's network stack, with a HIGH CVSS score (7.8) and documented by Google Project Zero. The vulnerability involves improper RCU synchronization in __dst_negative_advice() that could lead to UAF attacks, and has been recognized in security publications regarding Android kernel exploits.
Triage Info
Decided atMar 03, 2026
Published DateJun 10, 2024