POC详情: e42de9d2528bb47581f24221bc3f77a72168f9de

来源
关联漏洞
标题: Linux kernel 安全漏洞 (CVE-2025-39682)
描述:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于tls模块处理rx_list上零长度记录时存在问题。
描述
A variant of CVE-2024-58239
介绍
# CVE-2025-39682 exploit on kernelCTF mitigation instance
This is also my first (? idk, this is a variant of CVE-2024-58239) 1-day exploit.

Patch: [tls: fix handling of zero-length records on the rx_list](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/tls?id=62708b9452f8eb77513115b17c4f8d1a22ebf843)

This CVE was used in `exp398` and and `exp403`. [kernelCTF spreadsheet](https://docs.google.com/spreadsheets/d/e/2PACX-1vS1REdTA29OJftst8xN5B5x8iIUcxuK6bXdzF8G1UXCmRtoNsoQ9MbebdRdFnj6qZ0Yd7LwQfvYC2oF/pubhtml#).

For folder structures and how to run the exploit, refer to my [CVE-2024-58239 repo](https://github.com/khoatran107/cve-2024-58239).

I modify my previous exploit "a little bit". And it works on the same `mitigation-v4-6.6` instance, with a better success rate.

Success rate: 79/100.

Run on kernelCTF instance:
![image](https://hackmd.io/_uploads/BkgxSYo6xl.png)

Detailed write-up coming later, for both CVEs.
文件快照

[4.0K] /data/pocs/e42de9d2528bb47581f24221bc3f77a72168f9de ├── [ 723] calc_AC_rate.py ├── [ 81] compile.sh ├── [4.0K] exploit │   └── [4.0K] mitigation-v4-6.6 │   ├── [954K] client │   ├── [9.4K] client.cpp │   ├── [3.5K] exploit.c │   ├── [ 365] Makefile │   ├── [834K] server │   ├── [4.6K] server.cpp │   ├── [5.4K] shared.h │   └── [4.4K] sprayer.h ├── [ 24] flag ├── [ 588] local_runner.sh ├── [1.4K] qemu.sh ├── [ 958] README.md ├── [2.2K] script.gdb ├── [4.0K] shared │   └── [818K] exploit └── [ 483] test.py 3 directories, 17 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。