Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-38001 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2025-38001)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于hfsc中重复插入类到eltree,可能导致无限循环或UAF。
Description
CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC
Readme
# CVE-2025-38001 (RBTree Family Drama)

**Linux HFSC Eltree Use-After-Free - Debian 12 PoC**

This PoC utilizes a page-level data-only attack based on RBTree transformations to compromise the system. The exploit is portable and works on all kernelCTF instances (LTS 6.6.90, COS 109, COS 105) and Debian 12. On Ubuntu LTS it only requires minor modifications due to Kmalloc Random Caches.

Vulnerability analysis and exploit development: https://syst3mfailure.io/rbtree-family-drama.

![](exploit.gif)

Fixed by commit [ac9fe7dd8e730a103ae4481147395cc73492d786](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ac9fe7dd8e730a103ae4481147395cc73492d786).

# Disclaimer

The exploit provided in this repository is intended for educational purposes only. The author does not condone or support any illegal activities or unauthorized access to systems. Use this information responsibly and only in environments where you have explicit permission to test. The author is not liable for any damages or consequences resulting from the use of this exploit.
File Snapshot

[4.0K] /data/pocs/e0ed2ed14df133afe2e77a0bc1ee3fdeb8ff4998 ├── [ 18K] exploit.c ├── [581K] exploit.gif ├── [ 47] Makefile ├── [5.3K] netlink_utils.h └── [1.0K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.