| skipped 17 lines |
18 | 18 | | # compatible with the target system and modify the exploit accordingly. |
19 | 19 | | # |
20 | 20 | | # It works very reliably on Solaris 11.4 and should work on most vulnerable |
21 | | - | # Linux distributions (though I haven't tested it). For some reason, it fails to |
22 | | - | # obtain uid 0 on OpenBSD... They might have an additional protection in place. |
| 21 | + | # Linux distributions (though I haven't tested it). It fails on OpenBSD due to |
| 22 | + | # privilege separation. On this platform you should use raptor_xorgasm instead. |
23 | 23 | | # |
24 | 24 | | # Thanks to @alanc and @nushinde for discussing this alternative vector. |
25 | 25 | | # |
| skipped 13 lines |
39 | 39 | | # Vulnerable platforms (setuid Xorg 1.19.0 - 1.20.2): |
40 | 40 | | # Oracle Solaris 11 X86 [tested on 11.4.0.0.1.15.0 with Xorg 1.19.5] |
41 | 41 | | # Oracle Solaris 11 SPARC [untested] |
42 | | - | # CentOS Linux 7 [untested, it should work] |
| 42 | + | # CentOS Linux 7 [untested] |
43 | 43 | | # Red Hat Enterprise Linux 7 [untested] |
44 | 44 | | # Ubuntu Linux 18.10 [untested] |
45 | 45 | | # Ubuntu Linux 18.04 LTS [untested] |
| skipped 26 lines |