POC详情: e0ed2ed14df133afe2e77a0bc1ee3fdeb8ff4998

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2025-38001)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于hfsc中重复插入类到eltree,可能导致无限循环或UAF。
描述
CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC
介绍
# CVE-2025-38001 (RBTree Family Drama)

**Linux HFSC Eltree Use-After-Free - Debian 12 PoC**

This PoC utilizes a page-level data-only attack based on RBTree transformations to compromise the system. The exploit is portable and works on all kernelCTF instances (LTS 6.6.90, COS 109, COS 105) and Debian 12. On Ubuntu LTS it only requires minor modifications due to Kmalloc Random Caches.

Vulnerability analysis and exploit development: https://syst3mfailure.io/rbtree-family-drama.

![](exploit.gif)

Fixed by commit [ac9fe7dd8e730a103ae4481147395cc73492d786](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ac9fe7dd8e730a103ae4481147395cc73492d786).

# Disclaimer

The exploit provided in this repository is intended for educational purposes only. The author does not condone or support any illegal activities or unauthorized access to systems. Use this information responsibly and only in environments where you have explicit permission to test. The author is not liable for any damages or consequences resulting from the use of this exploit.
文件快照

[4.0K] /data/pocs/e0ed2ed14df133afe2e77a0bc1ee3fdeb8ff4998 ├── [ 18K] exploit.c ├── [581K] exploit.gif ├── [ 47] Makefile ├── [5.3K] netlink_utils.h └── [1.0K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。