### [CVE-2016-4557](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor. ### POC #### Reference - https://www.exploit-db.com/exploits/40759/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/HaxorSecInfec/autoroot.sh - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits - https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits - https://github.com/chreniuc/CTF - https://github.com/dylandreimerink/gobpfld - https://github.com/kkamagui/linux-kernel-exploits - https://github.com/meobeongok/kernels - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve- - https://github.com/ostrichxyz7/kexps - https://github.com/s0nk3y/php-kernel-exploit