POC详情: 587d975541073b8c8d63472d527c6d8cfb312b42

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2025-39946)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于TLS流未在发现无效记录头时及时中止,可能导致缓冲区溢出。
描述
Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
介绍
# README

This is an exploit for CVE-2025-39946. It will work on the `lts-6.12.48` kCTF instance (but not 100% reliable).

I wrote a blog post analysing this vulnerability in detail. [Check it out here](https://faith2dxy.xyz/2025-10-02/kCTF-TLS-nday-analysis/)!

# Adapting for other kernel versions

The only modification the exploit should need to work for other kernel versions is a change to the `CORE_PATTERN_OFFSET`. You'll have to get the target kernel's `bzImage`, load the kernel with root privs, and compare `core_pattern`'s address with `_text`'s address in `/proc/kallsyms`.

I don't think any other changes will be necessary to adapt the exploit for other versions.
文件快照

[4.0K] /data/pocs/587d975541073b8c8d63472d527c6d8cfb312b42 ├── [9.8K] exploit.c ├── [ 39] Makefile └── [ 679] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。