|
You are here |
www.willsroot.io | ||
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Linux Kernel stack overflow vulnerability. | |
| | | | |
syst3mfailure.io
|
|
| | | | | CVE-2025-38001 is a Use-After-Free vulnerability in the Linux network packet scheduler, specifically in the HFSC queuing discipline. When the HFSC qdisc is utilized with NETEM and NETEM packet duplication is enabled, using HFSC_RSC it is possible to cause a double class insertion in the HFSC eligible tree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue() due to an RBTree cycle. However, by adding TBF as root qdisc, it is possible to prevent packets from being dequeued, bypass the infinite loop, free the class, and trigger a Use-After-Free. | |
| | | | |
googleprojectzero.blogspot.com
|
|
| | | | | Guest blog post, posted by Andrey Konovalov Introduction Lately I've been spending some time fuzzing network-related Linux kernel int... | |
| | | | |
blog.osandov.com
|
|
| | | I just landed a really exciting feature for drgn: the ability to call arbitrary functions and write to memory in the Linux kernel. I think the technical details of the implementation are very interesting, and it's probably the funniest thing I've ever done, so I wanted to write about how it works. | ||