Conversation
* kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos * kernelctf: add CVE-2025-38248_cos
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
| @@ -0,0 +1,936 @@ | |||
| #define _GNU_SOURCE | |||
There was a problem hiding this comment.
According to kernelCTF rules (https://google.github.io/security-research/kernelctf/rules.html#kernelxdk-integration) all of the submissions from 2025-10-23 have to use the kernelXDK (Kernel eXploit Development Kit, read more here: xdk.dev) in the Github PR.
| context is disabled on each port and the port is removed from the global | ||
| router port list: | ||
|
|
||
| # ip link add name br1 up type bridge vlan_filtering 1 mcast_snooping 1 |
There was a problem hiding this comment.
Could you have another look at Markdown in the file? Right now "#" is interpreted like a header of the document. It's probably worth to use ``` block to enclose "bash" commands in it.
| @@ -0,0 +1,147 @@ | |||
| ##bridge: mcast: Fix use-after-free during router port configuration | |||
There was a problem hiding this comment.
The file lacks important information, like what are the versions affected, what capabilities (if any) needed to exploit the vuln, what configurations should be enabled etc. Please, check other (already merged exploit PRs) to see the what the file should contain. For example, https://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2025-37752_cos/docs/vulnerability.md
No description provided.