Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Incorrect Exploit Mapping in KernelCTF (CVE-2023-3609 & CVE-2023-3776) #163

Open
n132 opened this issue Feb 12, 2025 · 0 comments
Open

Incorrect Exploit Mapping in KernelCTF (CVE-2023-3609 & CVE-2023-3776) #163

n132 opened this issue Feb 12, 2025 · 0 comments

Comments

@n132
Copy link

n132 commented Feb 12, 2025

CVE-2023-3609

CVE-2023-3609's PoC does not exploit the described vulnerability; instead, it targets CVE-2023-4208.

Considering the vulnerability of CVE-2023-3609 described actually takes a very long time to trigger since it can only increase refcnt. I investigated and traced the PoC. I found it actually took advantage of the copied res structure in u32_init_knode (CVE-2023-4208): The exp script tries to bind the classifier to a non-existent class and it would trigger refcnt-- on the copied pointer (leads to UAF). When I applied the patch of CVE-2023-4208 on the linux kernel version the POC worked, the POC no longer works.

CVE-2023-3776

CVE-2023-3776's PoC has the same issue—it actually exploits CVE-2023-4207.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant