关联漏洞
描述
Exploit for CVE-2025-39946, a bug in the Linux kernel's net/tls subsystem.
介绍
# README
This is an exploit for CVE-2025-39946. It will work on the `lts-6.12.48` kCTF instance (but not 100% reliable).
I wrote a blog post analysing this vulnerability in detail. [Check it out here](https://faith2dxy.xyz/2025-10-02/kCTF-TLS-nday-analysis/)!
# Adapting for other kernel versions
The only modification the exploit should need to work for other kernel versions is a change to the `CORE_PATTERN_OFFSET`. You'll have to get the target kernel's `bzImage`, load the kernel with root privs, and compare `core_pattern`'s address with `_text`'s address in `/proc/kallsyms`.
I don't think any other changes will be necessary to adapt the exploit for other versions.
文件快照
[4.0K] /data/pocs/587d975541073b8c8d63472d527c6d8cfb312b42
├── [9.8K] exploit.c
├── [ 39] Makefile
└── [ 679] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。