POC详情: 964436bf236f06ddcd6985262b1de6eeca911f78

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2025-38676)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于内核命令行处理不当,可能导致栈缓冲区溢出。
描述
Stack buffer overflow during cmdline parsing
介绍
# CVE-2025-38676 — Linux Kernel ≤ 6.17-rc2 (AMD IOMMU) stack buffer overflow

This repo provides **safe, non-exploit PoC resources** to study CVE-2025-38676:
- Info-gathering + safety tools
- QEMU boot harness to exercise **long kernel cmdline** permutations
- Hardening guidance (GRUB/UEFI/Secure Boot; baseline `/proc/cmdline`)

> Vulnerability summary  
Upstream fix: *“iommu/amd: Avoid stack buffer overflow from kernel cmdline … avoid writing 1 byte past the end of 'acpiid' if the 'str' argument is maximum length.”*  
**Scope:** kernels ≤ 6.17-rc2 (IOMMU/AMD path). Distros are shipping patched kernels.  
Sources: NVD, SUSE tracker, VulDB, commit reference.  
- NVD: description & fix note.  
- SUSE: mirrors upstream text.  
- VulDB: affected up to 6.17-rc2; critical.  
- Commit ref (via cvefeed.io): `git.kernel.org/stable/c/8503d0fcb1086...`.

### Ethics & Safe-Use
No weaponized exploit code. The harness **only** varies cmdline length/shape and collects logs to confirm stability or crashes in **a closed VM**.

### Quick start
```bash
sudo apt-get install -y build-essential qemu-system-x86 gcc make cpio busybox
cd tools && ./build.sh               # build cmdline checker
cd ../scripts && ./make_initramfs.sh # build tiny initramfs with busybox
./qemu_boot_example.sh               # boot VM with safe long cmdline
文件快照

[4.0K] /data/pocs/964436bf236f06ddcd6985262b1de6eeca911f78 ├── [4.0K] configs │   └── [ 191] example_cmdlines.txt ├── [ 11K] LICENSE ├── [ 36] MIT License — © CyberDudeBivash.txt ├── [1.3K] README.md ├── [4.0K] references │   └── [ 634] links.md ├── [4.0K] scripts │   ├── [ 675] cmdline_fuzzer.py │   ├── [ 81] collect_dmesg.sh │   ├── [1.2K] make_initramfs.sh │   └── [ 836] qemu_boot_example.sh └── [4.0K] tools ├── [ 190] build.sh ├── [ 286] cmdline_len_guard.h └── [1.5K] cmdline_safety_checker.c 4 directories, 12 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。