Cleanup apport_abrt_chroot_priv_esc #11761
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updates the
apport_abrt_chroot_priv_esc
module to be more in-line with current Linux LPE modules through code style changes and using new libs.Also fixes a few issues when using the module on Meterpreter sessions:
cd
, which won't work on Meterpreter sessions, causing hard linking to fail, causing the exploit to fail. Usingcd
also results in theexploit
directory generated by the exploit to appear in the working directory, not the intended directory, resulting in the directory not being cleaned up after a failed exploitation attempt.Note, it should work on Ubuntu 14.04.1 out of the box; but if you're testing on Fedora 19/20/21, you'll likely need to reintroduce the vulnerability as per #9399 (comment) #9399 (comment) (although disabling SELinux should not be necessary) - unless you feel like attempting to cherry pick the appropriate packages.