diff --git a/data/exploits/CVE-2022-1043/pre-compiled b/data/exploits/CVE-2022-1043/pre_compiled old mode 100644 new mode 100755 similarity index 100% rename from data/exploits/CVE-2022-1043/pre-compiled rename to data/exploits/CVE-2022-1043/pre_compiled diff --git a/modules/exploits/linux/local/cve_2022_1043_io_uring_priv_esc.rb b/modules/exploits/linux/local/cve_2022_1043_io_uring_priv_esc.rb index 429ac74b2a..eb5b75775a 100644 --- a/modules/exploits/linux/local/cve_2022_1043_io_uring_priv_esc.rb +++ b/modules/exploits/linux/local/cve_2022_1043_io_uring_priv_esc.rb @@ -119,7 +119,7 @@ class MetasploitModule < Msf::Exploit::Local upload_and_compile executable_path, code else vprint_status 'Dropping pre-compiled exploit on system...' - upload_and_chmodx executable_path, exploit_data('CVE-2022-1043', 'pre-compiled') + upload_and_chmodx executable_path, exploit_data('CVE-2022-1043', 'pre_compiled') end # Upload payload executable