Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36886 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2024-36886)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于 tipc 模块存在释放后重用漏洞。
Readme
# N-Day Vulnerability Research

## Overview
This project focuses on **N-Day vulnerabilities** in the Linux kernel, with an emphasis on understanding their lifecycle, analyzing their impact, and exploring mitigation strategies. N-Day vulnerabilities are publicly disclosed flaws that remain unpatched on many systems, making them high-value targets for attackers.  

The research investigates a specific Linux kernel subsystem and evaluates a real-world vulnerability (**CVE-2024-36886**), demonstrating its security implications and stressing the importance of timely patch management.

---

## Objectives
- Conduct a **comprehensive analysis** of Linux kernel subsystems and their potential vulnerabilities.  
- Study **N-Day vulnerabilities** using publicly available advisories and vulnerability databases.  
- Assess the **real-world impact** of delayed patching.  
- Explore the role of **automated tools and frameworks** in vulnerability discovery.  
- Provide **recommendations** for patch management and mitigation strategies.  

---

## Research Scope
- **Linux Kernel Subsystem Focus**: Networking subsystem with an emphasis on the TIPC (Transparent Inter-Process Communication) protocol.  
- **Vulnerability Lifecycle Analysis**: From discovery to disclosure, patching, and exploitation risks.  
- **Real-World Case Studies**: Examples of N-Day vulnerabilities, their exploitation, and organizational impact.  
- **Optional Exploration**: Zero-Day research and its relation to N-Day vulnerabilities.  

---

## Methodology
1. **Literature Review**: Analysis of prior research on Linux kernel vulnerabilities.  
2. **Subsystem Analysis**: Study of kernel components such as memory, process, filesystem, networking, and device drivers.  
3. **Vulnerability Identification**: Using static/dynamic analysis, fuzzing, and community vulnerability databases.  
4. **Case Study**: Examination of CVE-2024-36886 to understand its severity, root cause, and patching timeline.  
5. **Mitigation Strategies**: Recommendations for patching, secure coding practices, and proactive defense mechanisms.  

---

## Key Findings
- N-Day vulnerabilities remain a major threat due to **delayed patching** across organizations.  
- The **Linux kernel** is a high-value target because of its widespread use in servers, cloud, mobile, and embedded systems.  
- Case studies such as **Dirty COW (CVE-2016-5195)** highlight how unpatched vulnerabilities lead to privilege escalation and system compromise.  
- Automated tools like **Metasploit, Nessus, OpenVAS, AFL, and Valgrind** play a critical role in vulnerability research and mitigation.  

---

## Contributions
- Improved **understanding of kernel-level vulnerabilities**.  
- Analysis of **CVE-2024-36886** and its implications on Linux networking security.  
- Recommendations for **timely patch deployment** and **proactive security measures**.  
- Contribution to ongoing efforts in **vulnerability management and secure practices** within the Linux ecosystem.  

---

## Future Work
- Extending research into **Zero-Day vulnerabilities** and their relation to N-Day threats.  
- Further exploration of **automated exploit development frameworks**.  
- Development of advanced **patch management strategies** for critical systems.  

---

## Authors
- Muhammad Danial Tahir (21L-5831)  
- Abu Bakar Shahid (21L-5845)  
- Muhammad Junaid (21L-6064)  

**Supervisor**: Dr. Arshad Ali  
National University of Computer and Emerging Sciences, Lahore  
April 2025  
File Snapshot

[4.0K] /data/pocs/b9282912d76a510983e70bf8bf29e7ce00538302 ├── [4.0K] About Networking Subsystem │   ├── [ 13K] 1-OS-Subsystems.docx │   ├── [ 17K] 2-Network-Subsystem.docx │   └── [ 13K] Network-Subsystem.txt ├── [473K] CVE-20204-36886.png ├── [3.4K] README.md ├── [4.0K] Research Papers │   ├── [212K] [10]Taxonomy_of_Linux_Kernel_Vulnerability_Solutions.pdf │   ├── [1.1M] [12].pdf │   ├── [1.5M] [14] UserAfterFreeMitigation.pdf │   ├── [382K] [4]K-Leak.pdf │   ├── [363K] [5].pdf │   ├── [1.2M] [6]DirtyCred.pdf │   ├── [1.5M] A_Horizontal_Study_on_the_Mixed_IPID_Assignment_Vulnerability_in_the_Linux_Ecosystem.pdf │   ├── [639K] Automated Attack Discovery in TCP Congestion.pdf │   ├── [1.5M] Investigation of the 2016 Linux TCP Stack Vulnerability at Scale.pdf │   ├── [ 39K] KOOBE (Kernel Out-Of-Bounds Write Vulnerabilities).docx │   ├── [690K] KOOBE (Kernel Out-Of-Bounds Write Vulnerabilities).pdf │   ├── [665K] Off-Path TCP Exploits Global Rate Limit Considered Dangerous.pdf │   ├── [1.9M] Off-Path_TCP_Exploits_of_the_Challenge_ACK_Global_Rate_Limit.pdf │   ├── [1.7M] Off-Path TCP Exploits of the Mixed IPID Assignment.pdf │   ├── [1.8M] Off-Path_TCP_Hijacking_Attacks_via_the_Side_Channel_of_Downgraded_IPID.pdf │   ├── [1.6M] Paper-1_To Boldly Go Where No Fuzzer Has Gone Before.pdf │   ├── [1.5M] Paper-2.pdf │   ├── [1.8M] Paper-3.pdf │   ├── [479K] Paper-4.pdf │   ├── [737K] Paper-5.pdf │   ├── [353K] Paper-6.pdf │   ├── [230K] Paper-7.pdf │   ├── [633K] Paper-8.pdf │   └── [596K] Static Detection of Packet Injection Vulnerabilities –.pdf └── [4.0K] Vulnerable Kernel Files ├── [ 22K] msg.c └── [2.4K] tipc_buf_append.c 3 directories, 31 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.