Skip to content

Add kernelCTF CVE-2026-23278_cos (#exp462)#374

Open
G0RiyA wants to merge 3 commits intogoogle:masterfrom
G0RiyA:kernelctf-CVE-2026-23278
Open

Add kernelCTF CVE-2026-23278_cos (#exp462)#374
G0RiyA wants to merge 3 commits intogoogle:masterfrom
G0RiyA:kernelctf-CVE-2026-23278

Conversation

@G0RiyA
Copy link
Copy Markdown

@G0RiyA G0RiyA commented Apr 30, 2026

kernelCTF submission for CVE-2026-23278 (nf_tables catchall break-statement UAF).

Submission ID: exp462

Target: cos-121-18867.381.30

Note: vuln-verify CI fails because the fix commit (7cb9a23d7ae4) has not been backported to the 6.6 stable branch yet. It exists in v7.0-rc4 and was backported to v6.12.78+, but not to 6.6.x which COS-121-18867.381.30 is based on.

@google-cla
Copy link
Copy Markdown

google-cla Bot commented Apr 30, 2026

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

@G0RiyA G0RiyA force-pushed the kernelctf-CVE-2026-23278 branch from 04f598b to b702377 Compare April 30, 2026 00:16
G0RiyA added 2 commits May 9, 2026 22:46
Replace hardcoded CORE_PATTERN_PHYS and struct unix_address_user /
BIND_LEN with per-target kernelXDK definitions using AddSymbol and
AddStruct, following the recommended pattern from the libxdk sample
exploit documentation.

Update exploit.md line references and code blocks to match.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant