New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add check for SMAP #11032

Merged
merged 1 commit into from Nov 27, 2018

Conversation

Projects
None yet
3 participants
@bcoles
Contributor

bcoles commented Nov 27, 2018

The exploit description is a lie. The exploit does not bypass SMAP. RIP kernels.

Fixes #9987.

@wvu-r7 wvu-r7 self-assigned this Nov 27, 2018

@wvu-r7

This comment has been minimized.

Contributor

wvu-r7 commented Nov 27, 2018

Grabbing from IRC.

@wvu-r7 wvu-r7 merged commit 180876d into rapid7:master Nov 27, 2018

3 checks passed

Metasploit Automation - Sanity Test Execution Successfully completed all tests.
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details
continuous-integration/travis-ci/pr The Travis CI build passed
Details

wvu-r7 added a commit that referenced this pull request Nov 27, 2018

@wvu-r7

This comment has been minimized.

Contributor

wvu-r7 commented Nov 27, 2018

Release Notes

The documentation for the exploit/linux/local/af_packet_chocobo_root_priv_esc module has been updated to note that the exploit does not bypass SMAP.

msjenkins-r7 added a commit that referenced this pull request Nov 27, 2018

@bcoles bcoles deleted the bcoles:af_packet_chocobo_root_priv_esc branch Nov 27, 2018

@gdavidson-r7 gdavidson-r7 added the rn-fix label Dec 3, 2018

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment