CVE-2024-36971

ENISA EUVD: EUVD-2024-36321 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 2 articles Published: 2024-06-10

EPSS Score

Source: FIRST.org · 2026-05-23
0.44%
probability
This CVE has a 0.44% probability of being exploited in the next 30 days.
0% Top 63.4th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). Note that sk_dst_reset(sk) is implementing this protocol correctly, while __dst_negative_advice() uses the wrong order. Given that ip6_negative_advice() has special logic against RTF_CACHE, this means each of the three ->negative_advice() existing methods must perform the sk_dst_reset() themselves. Note the check against NULL dst is centralized in __dst_negative_advice(), there is no need to duplicate it in various callbacks. Many thanks to Clement Lecigne for tracking this issue. This old bug became visible after the blamed commit, using UDP sockets.

Affected Products

Linux
Linux
a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314 a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314 a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314 a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314 a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314 a87cb3e48ee86d29868d3f59cfb9ce1a8fa63314
Linux
Linux
4.6 0 4.19.316 5.4.278 5.10.219 5.15.161

Attack Intelligence

Google Project Zero

Patched
Aug. 5, 2024
Reported by
Clément Lecigne of Google's Threat Analysis Group
Root Cause Analysis
???

Exploits & PoC

Kronk-imp/CVE-2024-36971

Poc for CVE-2024-36971

1 2026-04-14
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
82%
EPSS 0.44%
CVSS v3.1 7.8
Mentions 2
Last Seen Aug 05, 2024

CNA Information

CNA Assigner
Linux
CNA Title
net: fix __dst_negative_advice() race

Analyst Note

This CVE is confirmed as a legitimate use-after-free vulnerability in the Linux kernel's network stack, with a HIGH CVSS score (7.8) and documented by Google Project Zero. The vulnerability involves improper RCU synchronization in __dst_negative_advice() that could lead to UAF attacks, and has been recognized in security publications regarding Android kernel exploits.

Triage Info

Decided atMar 03, 2026
Published DateJun 10, 2024